Skip to main content

Hardware Security and Trust: A New Battlefield of Information

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12513))

Included in the following conference series:

Abstract

Hardware security and trust has received a lot of attention in the past 25 years. The purpose of this paper is to introduce the fundamental problems related to hardware security and trust to audiences who do not necessarily have hardware design background. In order to do that, we first discuss the evolving roles of hardware in security from an enable to an enhancer and now an enforcer as it get involves more and more in system security. Then we review the following key problems in hardware security, physical attacks, side channel analysis, intellectual property protection, hardware Trojan, hardware security primitives, and applications in security and trust. We provide a novel view of these problems and the corresponding solutions from the perspective of information battle between the attackers and designers, where we consider three types of information: data collected, processed, and stored by the hardware; information hidden in the design as watermark, fingerprint, and Trojans; and the chip fabrication variations that can be extracted and utilized. It is interesting to see how the hardware security and trust problems can be unified under this framework of information battle (stealing and protection). Unfortunately, there are more unknowns and challenges than what we have discovered on this framework as we illustrated in the section of open problems. However, the emerging Internet of Things and cyber physical systems have provided a large application field for researchers and practitioners to work on hardware based lightweight security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Crypto 1996, pp. 104–113 (1996)

    Google Scholar 

  2. Virtual Socket Interface Alliance: Intellectual Property Protection White Paper: Schemes, Alternatives and Discussion, Version 1.1, January 2001

    Google Scholar 

  3. Report of the Defense Science Board Task Force on High Performance Microchip Supply, February 2005

    Google Scholar 

  4. Qu, G., Yuan, L.: Design THINGS for the internet of things – an EDA perspective. In: Proceedings of IEEE/ACM International Conference on Computer-Aided Design, pp. 411–416, November 2014

    Google Scholar 

  5. Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan Detection using IC Fingerprint. In: IEEE Symposium on Security and Privacy, pp. 296–310, May 2007

    Google Scholar 

  6. Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of 44th ACM/IEEE Design Automation Conference, pp. 9–14, June 2007

    Google Scholar 

  7. United States National Institute of Standards and Technology (NIST): Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 26 November 2001

    Google Scholar 

  8. Wang, Q., Qu, G.: A silicon PUF based entropy pump. IEEE Trans. Dependable Secure Comput. 16(3), 402–414 (2018)

    Article  Google Scholar 

  9. Arafin, M., Gao, M., Qu, G.: VOLtA: voltage over-scaling based lightweight authentication for IoT applications. In: Proceedings of 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 336–341, January 2017

    Google Scholar 

  10. Gu, J., Qu, G., Zho, Q.: Information hiding for trusted system design. In: Proceedings of the 46th ACM/IEEE Design Automation Conference, pp. 698–701, June 2009

    Google Scholar 

  11. Qu, G., Potkonjak, M.: Intellectual Property Protection in VLSI Design: Theory and Practice. Springer Science and Business Media, Berlin, May 2007. https://orcid.org/10.1007/b105846

Download references

Acknowledgement

This work is supported in part by the DARPA project entitled “INDEPENDENT VERIFICATION &VALIDATION (IV&V) OF THE AISS PROGRAM”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gang Qu .

Editor information

Editors and Affiliations

Appendix

Appendix

CHES 2021 list of topics in the call for paper (https://ches.iacr.org/2021/callforpapers.php)

figure a

HOST 2021 list of topics in the call for paper (http://www.hostsymposium.org/call-for-paper.php).

figure b

AsianHOST 2020 list of topics in the call for paper (http://asianhost.org/2020/authors.htm#cfp)

figure c

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qu, G. (2020). Hardware Security and Trust: A New Battlefield of Information. In: Zhu, Q., Baras, J.S., Poovendran, R., Chen, J. (eds) Decision and Game Theory for Security. GameSec 2020. Lecture Notes in Computer Science(), vol 12513. Springer, Cham. https://doi.org/10.1007/978-3-030-64793-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-64793-3_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-64792-6

  • Online ISBN: 978-3-030-64793-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics