skip to main content
10.1145/2382196.2382323acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
tutorial

Hardware enhanced security

Published: 16 October 2012 Publication History

Abstract

Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have been significant efforts recently in hardware communities that aim to leverage hardware strengths to secure software layers, and also to secure hardware itself. This tutorial presents some of these hardware-enhanced security techniques to the security community.

Cited By

View all
  • (2018)QCAPUF: QCA-based physically unclonable function as a hardware security primitiveSemiconductor Science and Technology10.1088/1361-6641/aab45833:4(045011)Online publication date: 20-Mar-2018
  • (2016)A Survey on the Studies of Security Guard Technology for Memory2016 International Conference on Information System and Artificial Intelligence (ISAI)10.1109/ISAI.2016.0045(172-175)Online publication date: Jun-2016
  • (2015)Introduction to Hardware SecurityElectronics10.3390/electronics40407634:4(763-784)Online publication date: 13-Oct-2015
  • Show More Cited By

Index Terms

  1. Hardware enhanced security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
    October 2012
    1088 pages
    ISBN:9781450316514
    DOI:10.1145/2382196

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 October 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. hardware security
    2. hardware trojan
    3. puf
    4. secure cloud computing
    5. secure processors
    6. side channel attacks

    Qualifiers

    • Tutorial

    Conference

    CCS'12
    Sponsor:
    CCS'12: the ACM Conference on Computer and Communications Security
    October 16 - 18, 2012
    North Carolina, Raleigh, USA

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 19 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)QCAPUF: QCA-based physically unclonable function as a hardware security primitiveSemiconductor Science and Technology10.1088/1361-6641/aab45833:4(045011)Online publication date: 20-Mar-2018
    • (2016)A Survey on the Studies of Security Guard Technology for Memory2016 International Conference on Information System and Artificial Intelligence (ISAI)10.1109/ISAI.2016.0045(172-175)Online publication date: Jun-2016
    • (2015)Introduction to Hardware SecurityElectronics10.3390/electronics40407634:4(763-784)Online publication date: 13-Oct-2015
    • (2014)CNPUF: A Carbon Nanotube-based Physically Unclonable Function for secure low-energy hardware design2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC)10.1109/ASPDAC.2014.6742869(73-78)Online publication date: Jan-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media