Emerging Technologies in Computing (JETC)


Search Issue
enter search term and/or author name


ACM Journal on Emerging Technologies in Computing Systems (JETC) - Special Issue on Secure and Trustworthy Computing, Volume 13 Issue 1, December 2016

Section: Special Issue on Secure and Trustworthy Computing

Guest Editorial Special Issue on Secure and Trustworthy Computing
Ozgur Sinanoglu, Ramesh Karri
Article No.: 1
DOI: 10.1145/2898433

MRAM PUF: Using Geometric and Resistive Variations in MRAM Cells
Jayita Das, Kevin Scott, Sanjukta Bhanja
Article No.: 2
DOI: 10.1145/2854154

In this work, we have studied two novel techniques to enhance the performance of existing geometry-based magnetoresistive RAM physically unclonable function (MRAM PUF). Geometry-based MRAM PUFs rely only on geometric variations in MRAM cells that...

Emerging Technology-Based Design of Primitives for Hardware Security
Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, X. Sharon Hu, Michael Niemier, Yier Jin
Article No.: 3
DOI: 10.1145/2816818

Hardware security concerns such as intellectual property (IP) piracy and hardware Trojans have triggered research into circuit protection and malicious logic detection from various design perspectives. In this article, emerging technologies are...

Spintronic PUFs for Security, Trust, and Authentication
Anirudh Iyengar, Swaroop Ghosh, Kenneth Ramclam, Jae-Won Jang, Cheng-Wei Lin
Article No.: 4
DOI: 10.1145/2809781

We propose spintronic physically unclonable functions (PUFs) to exploit security-specific properties of domain wall memory (DWM) for security, trust, and authentication. We note that the nonlinear dynamics of domain walls (DWs) in the physical...

STT-MRAM-Based PUF Architecture Exploiting Magnetic Tunnel Junction Fabrication-Induced Variability
Elena Ioana Vatajelu, Giorgio Di Natale, Mario Barbareschi, Lionel Torres, Marco Indaco, Paolo Prinetto
Article No.: 5
DOI: 10.1145/2790302

Physically Unclonable Functions (PUFs) are emerging cryptographic primitives used to implement low-cost device authentication and secure secret key generation. Weak PUFs (i.e., devices able to generate a single signature or to deal with a...

A Survey on Chip to System Reverse Engineering
Shahed E. Quadir, Junlin Chen, Domenic Forte, Navid Asadizanjani, Sina Shahbazmohamadi, Lei Wang, John Chandy, Mark Tehranipoor
Article No.: 6
DOI: 10.1145/2755563

The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions. To inhibit RE for those with dishonest intentions (e.g., piracy and counterfeiting), it is important that the community is aware of the...

Frontside Versus Backside Laser Injection: A Comparative Study
Stephan De Castro, Jean-Max Dutertre, Bruno Rouzeyre, Giorgio Di Natale, Marie-Lise Flottes
Article No.: 7
DOI: 10.1145/2845999

The development of cryptographic devices was followed by the development of so-called implementation attacks, which are intended to retrieve secret information exploiting the hardware itself. Among these attacks, fault attacks can be used to...

A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, Ruggero Susella
Article No.: 8
DOI: 10.1145/2767132

Elliptic curve cryptosystems proved to be well suited for securing systems with constrained resources like embedded and portable devices. In a fault-based attack, errors are induced during the computation of a cryptographic primitive, and the...

Beat Frequency Detector--Based High-Speed True Random Number Generators: Statistical Modeling and Analysis
Yingjie Lao, Qianying Tang, Chris H. Kim, Keshab K. Parhi
Article No.: 9
DOI: 10.1145/2866574

True random number generators (TRNGs) are crucial components for the security of cryptographic systems. In contrast to pseudo--random number generators (PRNGs), TRNGs provide higher security by extracting randomness from physical phenomena. To...

Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques
Amey Kulkarni, Youngok Pino, Matthew French, Tinoosh Mohsenin
Article No.: 10
DOI: 10.1145/2827699

In this article, we propose a real-time anomaly detection framework for an NoC-based many-core architecture. We assume that processing cores and memories are safe and anomaly is included through a communication medium (i.e., router). The article...

Gates vs. Splitters: Contradictory Optimization Objectives in the Synthesis of Optical Circuits
Arighna Deb, Robert Wille, Oliver Keszöcze, Stefan Hillmich, Rolf Drechsler
Article No.: 11
DOI: 10.1145/2904445

Optical circuits are considered a promising emerging technology for applications in ultra-high-speed networks or interconnects. However, the development of (automatic) synthesis approaches for such circuits is still in its infancy. Although first...