An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools
- 29 December 2020
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- Vol. 40 (6), 1010-1038
- https://doi.org/10.1109/tcad.2020.3047976
Abstract
Hardware security and trust have become a pressing issue during the last two decades due to the globalization of the semi-conductor supply chain and ubiquitous network connection of computing devices. Computing hardware is now an attractive attack surface for launching powerful cross-layer security attacks, allowing attackers to infer secret information, hijack control flow, compromise system root-of-trust, steal intellectual property (IP) and fool machine learners. On the other hand, security practitioners have been making tremendous efforts in developing protection techniques and design tools to detect hardware vulnerabilities and fortify hardware design against various known hardware attacks. This paper presents an overview of hardware security and trust from the perspectives of threats, countermeasures and design tools. By introducing the most recent advances in hardware security research and developments, we aim to motivate hardware designers and electronic design automation tool developers to consider the new challenges and opportunities of incorporating an additional dimension of security into robust hardware design, testing and verification.Keywords
Funding Information
- National Natural Science Foundation of China (62074131)
- National Research Foundation, Singapore, through its National Cybersecurity Research and Development Programme/Cyber-Hardware Forensic and Assurance Evaluation Research and Development Programme NCR (CHFA-GC1-AW01)
This publication has 206 references indexed in Scilit:
- Return-Oriented ProgrammingACM Transactions on Information and System Security, 2012
- Non-monopolizable cachesACM Transactions on Architecture and Code Optimization, 2012
- Design and characterisation of an AES chip embedding countermeasuresInternational Journal of Intelligent Engineering Informatics, 2011
- A case study in hardware Trojan design and implementationInternational Journal of Information Security, 2010
- Lest we rememberCommunications of the ACM, 2009
- Differential Side Channel Analysis Attacks on FPGA Implementations of ARIAETRI Journal, 2008
- Power and electromagnetic analysis: Improved model, consequences and comparisonsIntegration, 2007
- Strengthening hardware AES implementations against fault attacksIET Information Security, 2007
- Remote timing attacks are practicalComputer Networks, 2005
- Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphersIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2002