Attacks on Lightweight Hardware-Based Security Primitives

11/26/2020
by   Jack Edmonds, et al.
0

In today's digital age, the ease of data collection, transfer, and storage continue to shape modern society and the ways we interact with our world. The advantages are numerous, but there is also an increased risk of information unintentionally falling into the wrong hands. Finding methods of protecting sensitive information at the hardware level is of utmost importance, and in this paper, we aim to provide a survey on recent developments in attacks on lightweight hardware-based security primitives (LHSPs) designed to do just that. Specifically, we provide an analysis of the attack resilience of these proposed LHSPs in an attempt to bring awareness to any vulnerabilities that may exist. We do this in the hope that it will encourage the continued development of attack countermeasures as well as completely new methods of data protection in order to prevent the discussed methods of attack from remaining viable in the future. The types of LHSPs discussed include physical unclonable functions (PUFs) and true random number generators (TRNGs), with a primary emphasis placed on PUFs.

READ FULL TEXT

page 2

page 4

page 5

research
10/04/2022

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Physical Unclonable Functions (PUFs) are promising security primitives f...
research
01/11/2019

Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework

Rowhammer is a hardware-based bug that allows the attacker to modify the...
research
07/28/2018

A Survey of Cyber Security Countermeasures Using Hardware Performance Counters

Cyber attacks and malware are now more prevalent than ever and the trend...
research
08/30/2022

Survey on Architectural Attacks: A Unified Classification and Attack Model

According to the World Economic Forum, cyber attacks are considered as o...
research
07/03/2023

Practical Non-Invasive Probing Attacks Against Novel Carbon-Nanotube-Based Physical Unclonable Functions

As the number of devices being interconnected increases, so does also th...
research
07/18/2020

A New Doctrine for Hardware Security

In this paper, we promote the idea that recent woes in hardware security...

Please sign up or login with your details

Forgot password? Click here to reset