The footprint and power constraints imposed on internet-of-things end-points, smart sensors, mobile and ad hoc network devices make traditional and software based cryptographic solutions that require a general-purpose processor increasingly unfeasible. The fact that security is not the primary functionality of these devices means that only a small portion of their limited processing power and storage is available for security, driving the need for alternative security solutions. Hardware security - including hardware obfuscation, hardware security primitives, side-channel attacks and so on - is therefore becoming an increasingly active research area in both academia and industry.
This book discusses the fundamentals of reversible logics, hardware obfuscations, SAT resistant logic obfuscation, and design-for-security. Novel security primitives such as state-of-the-art true random number generators are also explored. Modern micro-architectural attacks enabled with the superscalar microprocessors and its countermeasures are analysed to shed light on how existing architectures can be fortified or made more robust against attack. The introduction of hardware security into cognitive radio networks, 5G networks and machine learning, which are widely considered to be the most promising major contributors to next wave of technological growth, are also discussed.
The book serves as an advanced reference for researchers on current hardware security problems, challenges and solutions.
1. IP/IC piracy threats of reversible circuits
2. Improvements and recent updates of persistent fault analysis on block ciphers
3. Deployment of EMC techniques in design of IC chips for hardware security
Part II - Design for security
4. Hardware obfuscation for IP protection
5. Formal verification for SoC security
6. Silicon-based true random number generators
7. Micro-architectural attacks and countermeasures on public-key implementations
8. Mitigating the CACHEKIT attack
9. Deep learning network security
10. Security implications of non-digital components
11. Accelerating homomorphic encryption in hardware: a review
12. Information leakage from robust codes protecting cryptographic primitives
Part III - Physical-layer security
13. Confidential and energy-efficient cognitive communications by physical-layer security
14. Physical-layer security for mmWave massive MIMO communications in 5G networks
15. Security of in-vehicle controller area network: a review and future directions
Download Frontiers in Hardware Security and Trust: Theory, design and practice PDF or ePUB format free