Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs. (29th January 2020)
- Record Type:
- Journal Article
- Title:
- Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs. (29th January 2020)
- Main Title:
- Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs
- Authors:
- Maharmeh, Hamza Al
Alhawari, Mohammad
Hung, Chung-Chih
Ismail, Mohammed - Abstract:
- Hardware security threats have gained a tremendous attention where extensive research efforts have been expended toward developing effective countermeasures. These threats can be categorised into five main attacks which are: reverse engineering, side-channel analysis, intellectual property (IP) cores piracy/IC overbuilding, counterfeiting, and hardware Trojans. This paper investigates the most efficient state-of-the-art techniques that are used to thwart main hardware attacks. Reported work in the literature proposed various countermeasures, where obfuscation, camouflaging, and physically unclonable functions (PUFs) are considered the most powerful and effective methods. In obfuscation technique, the chip will be locked and it will not function properly unless the correct secret key is supplied. This paper addresses also camouflaging countermeasure which is a layout-based technique that is used to protect IP cores. Additionally, this paper provides a detailed study on silicon PUFs, where they can be classified into weak and strong PUFs. In this paper, various PUF architectures will be discussed along with the design constraints.
- Is Part Of:
- International journal of multimedia intelligence and security. Volume 3:Number 3(2020)
- Journal:
- International journal of multimedia intelligence and security
- Issue:
- Volume 3:Number 3(2020)
- Issue Display:
- Volume 3, Issue 3 (2020)
- Year:
- 2020
- Volume:
- 3
- Issue:
- 3
- Issue Sort Value:
- 2020-0003-0003-0000
- Page Start:
- 271
- Page End:
- 292
- Publication Date:
- 2020-01-29
- Subjects:
- hardware security -- physical unclonable functions -- PUFs -- weak PUFs -- strong PUFs -- silicon PUFs -- obfuscation -- camouflaging -- logic locking
Security systems -- Periodicals
Data protection -- Periodicals
Computer security -- Periodicals
Biometric identification -- Periodicals
005.8 - Journal URLs:
- http://www.inderscience.com/browse/index.php?journalID=359 ↗
http://www.inderscience.com/ ↗ - Languages:
- English
- ISSNs:
- 2042-3462
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - BLDSS-3PM
British Library STI - ELD Digital store - Ingest File:
- 12357.xml