Alioto, 2022 - Google Patents
Aggressive design reuse for ubiquitous zero-trust edge security—From physical design to machine-learning-based hardware patchingAlioto, 2022
View PDF- Document ID
- 4489135491698409974
- Author
- Alioto M
- Publication year
- Publication venue
- IEEE Open Journal of the Solid-State Circuits Society
External Links
Snippet
This work presents an overview of challenges and solid pathways toward ubiquitous and sustainable hardware security in next-generation silicon chips at the edge of distributed and connected systems (eg, IoT and AIoT). As the first challenge, the increasingly connected …
- 238000010801 machine learning 0 title abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alioto | Trends in hardware security: From basics to ASICs | |
Helfmeier et al. | Cloning physically unclonable functions | |
Nedospasov et al. | Invasive PUF analysis | |
Li et al. | Ultra-compact and robust physically unclonable function based on voltage-compensated proportional-to-absolute-temperature voltage generators | |
Breier et al. | How practical are fault injection attacks, really? | |
Li et al. | A self-regulated and reconfigurable CMOS physically unclonable function featuring zero-overhead stabilization | |
Wan et al. | An invasive-attack-resistant PUF based on switched-capacitor circuit | |
Guo et al. | When capacitors attack: Formal method driven design and detection of charge-domain trojans | |
Knechtel | Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges | |
Akter et al. | A survey on hardware security: Current trends and challenges | |
Tajik et al. | Emission analysis of hardware implementations | |
Clark et al. | Physically unclonable functions using foundry SRAM cells | |
Yehoshuva et al. | A survey of security attacks on silicon based weak PUF architectures | |
KR102122457B1 (en) | Security device having physical unclonable function | |
Knechtel | Hardware security for and beyond CMOS technology | |
Kumar et al. | Secure split test techniques to prevent IC piracy for IoT devices | |
Zhang et al. | A SC PUF standard cell used for key generation and anti-invasive-attack protection | |
Alioto | Aggressive design reuse for ubiquitous zero-trust edge security—From physical design to machine-learning-based hardware patching | |
Kareem et al. | Physical unclonable functions based hardware obfuscation techniques: a state of the art | |
Yamashita et al. | Redshift: Manipulating signal propagation delay via continuous-wave lasers | |
Tajik | On the physical security of physically unclonable functions | |
Bai et al. | PUF‐based encryption method for IC cards on‐chip memories | |
Rangarajan et al. | Next Era in Hardware Security | |
Nagata et al. | Analog Techniques for Digital Security: My gratitudes to visionary discussions | |
Sudhanya et al. | Study of different silicon physical unclonable functions |