The overview of "Era of Sentinel Tech: Charting Hardware Security Landscapes through Post-Silicon Innovation, Threat Mitigation and Future Trajectories".
Abstract:
To meet the demanding requirements of VLSI design, including improved speed, reduced power consumption, and compact architectures, various IP cores from trusted and untru...Show MoreMetadata
Abstract:
To meet the demanding requirements of VLSI design, including improved speed, reduced power consumption, and compact architectures, various IP cores from trusted and untrusted platforms are often integrated into a single System-on-Chip (SoC). However, this convergence poses a significant security challenge, as adversaries can exploit it to extract unauthorized information, compromise system performance, and obtain secret keys. Meanwhile, traditional CMOS features have limitations in addressing hardware vulnerabilities and security threats, so promising post-silicon technologies offer potential solutions. Beyond-CMOS technologies offer avenues to fortify hardware security through distinct physical properties and nontraditional computing paradigms. These advancements bolster authentication processes, enhance key generation mechanisms, ensure hardware integrity and fortify resilience against side-channel attacks, hardware Trojans and quantum-resistant cryptography in securing hardware systems. This article provides a detailed review of hardware security, encompassing the identification and mitigation of threats, the implementation of robust countermeasures, the utilization of innovative primitives, countermeasures, various methodologies and distinct features offered by emerging technologies to resist hardware threats. Moreover, strategies to address challenges, explore future directions, and outline plans for achieving further research outcomes have been put forth in this field.
The overview of "Era of Sentinel Tech: Charting Hardware Security Landscapes through Post-Silicon Innovation, Threat Mitigation and Future Trajectories".
Published in: IEEE Access ( Volume: 12)
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Hardware Security ,
- Power Consumption ,
- Secret Key ,
- Side-channel ,
- Hardware System ,
- Key Generation ,
- Machine Learning ,
- Impedance ,
- Internet Of Things ,
- Quantum Computing ,
- Internet Of Things Devices ,
- Spintronic ,
- Count Measurements ,
- Internet Of Things Applications ,
- Phase Change Materials ,
- CMOS Technology ,
- Unauthorized Access ,
- Neuromorphic Computing ,
- Resistive Random Access Memory ,
- Physical Unclonable Functions ,
- Carbon Nanotubes ,
- Low Resistance State ,
- Spin Transfer Torque ,
- Area Overhead ,
- Random Bits ,
- Cryptographic Keys ,
- Silicon Nanowires ,
- Magnetic Layer ,
- Electron Spin
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Hardware Security ,
- Power Consumption ,
- Secret Key ,
- Side-channel ,
- Hardware System ,
- Key Generation ,
- Machine Learning ,
- Impedance ,
- Internet Of Things ,
- Quantum Computing ,
- Internet Of Things Devices ,
- Spintronic ,
- Count Measurements ,
- Internet Of Things Applications ,
- Phase Change Materials ,
- CMOS Technology ,
- Unauthorized Access ,
- Neuromorphic Computing ,
- Resistive Random Access Memory ,
- Physical Unclonable Functions ,
- Carbon Nanotubes ,
- Low Resistance State ,
- Spin Transfer Torque ,
- Area Overhead ,
- Random Bits ,
- Cryptographic Keys ,
- Silicon Nanowires ,
- Magnetic Layer ,
- Electron Spin
- Author Keywords