Abstract
Hardware security and trust has received a lot of attention in the past 25 years. The purpose of this paper is to introduce the fundamental problems related to hardware security and trust to audiences who do not necessarily have hardware design background. In order to do that, we first discuss the evolving roles of hardware in security from an enable to an enhancer and now an enforcer as it get involves more and more in system security. Then we review the following key problems in hardware security, physical attacks, side channel analysis, intellectual property protection, hardware Trojan, hardware security primitives, and applications in security and trust. We provide a novel view of these problems and the corresponding solutions from the perspective of information battle between the attackers and designers, where we consider three types of information: data collected, processed, and stored by the hardware; information hidden in the design as watermark, fingerprint, and Trojans; and the chip fabrication variations that can be extracted and utilized. It is interesting to see how the hardware security and trust problems can be unified under this framework of information battle (stealing and protection). Unfortunately, there are more unknowns and challenges than what we have discovered on this framework as we illustrated in the section of open problems. However, the emerging Internet of Things and cyber physical systems have provided a large application field for researchers and practitioners to work on hardware based lightweight security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Crypto 1996, pp. 104–113 (1996)
Virtual Socket Interface Alliance: Intellectual Property Protection White Paper: Schemes, Alternatives and Discussion, Version 1.1, January 2001
Report of the Defense Science Board Task Force on High Performance Microchip Supply, February 2005
Qu, G., Yuan, L.: Design THINGS for the internet of things – an EDA perspective. In: Proceedings of IEEE/ACM International Conference on Computer-Aided Design, pp. 411–416, November 2014
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan Detection using IC Fingerprint. In: IEEE Symposium on Security and Privacy, pp. 296–310, May 2007
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of 44th ACM/IEEE Design Automation Conference, pp. 9–14, June 2007
United States National Institute of Standards and Technology (NIST): Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 26 November 2001
Wang, Q., Qu, G.: A silicon PUF based entropy pump. IEEE Trans. Dependable Secure Comput. 16(3), 402–414 (2018)
Arafin, M., Gao, M., Qu, G.: VOLtA: voltage over-scaling based lightweight authentication for IoT applications. In: Proceedings of 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 336–341, January 2017
Gu, J., Qu, G., Zho, Q.: Information hiding for trusted system design. In: Proceedings of the 46th ACM/IEEE Design Automation Conference, pp. 698–701, June 2009
Qu, G., Potkonjak, M.: Intellectual Property Protection in VLSI Design: Theory and Practice. Springer Science and Business Media, Berlin, May 2007. https://orcid.org/10.1007/b105846
Acknowledgement
This work is supported in part by the DARPA project entitled “INDEPENDENT VERIFICATION &VALIDATION (IV&V) OF THE AISS PROGRAM”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
CHES 2021 list of topics in the call for paper (https://ches.iacr.org/2021/callforpapers.php)
HOST 2021 list of topics in the call for paper (http://www.hostsymposium.org/call-for-paper.php).
AsianHOST 2020 list of topics in the call for paper (http://asianhost.org/2020/authors.htm#cfp)
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Qu, G. (2020). Hardware Security and Trust: A New Battlefield of Information. In: Zhu, Q., Baras, J.S., Poovendran, R., Chen, J. (eds) Decision and Game Theory for Security. GameSec 2020. Lecture Notes in Computer Science(), vol 12513. Springer, Cham. https://doi.org/10.1007/978-3-030-64793-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-64793-3_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-64792-6
Online ISBN: 978-3-030-64793-3
eBook Packages: Computer ScienceComputer Science (R0)