enter search term and/or author name
Guest Editorial Special Issue on Secure and Trustworthy Computing
Ozgur Sinanoglu, Ramesh Karri
Article No.: 1
MRAM PUF: Using Geometric and Resistive Variations in MRAM Cells
Jayita Das, Kevin Scott, Sanjukta Bhanja
Article No.: 2
In this work, we have studied two novel techniques to enhance the performance of existing geometry-based magnetoresistive RAM physically unclonable function (MRAM PUF). Geometry-based MRAM PUFs rely only on geometric variations in MRAM cells that...
Emerging Technology-Based Design of Primitives for Hardware Security
Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, X. Sharon Hu, Michael Niemier, Yier Jin
Article No.: 3
Hardware security concerns such as intellectual property (IP) piracy and hardware Trojans have triggered research into circuit protection and malicious logic detection from various design perspectives. In this article, emerging technologies are...
We propose spintronic physically unclonable functions (PUFs) to exploit security-specific properties of domain wall memory (DWM) for security, trust, and authentication. We note that the nonlinear dynamics of domain walls (DWs) in the physical...
STT-MRAM-Based PUF Architecture Exploiting Magnetic Tunnel Junction Fabrication-Induced Variability
Elena Ioana Vatajelu, Giorgio Di Natale, Mario Barbareschi, Lionel Torres, Marco Indaco, Paolo Prinetto
Article No.: 5
Physically Unclonable Functions (PUFs) are emerging cryptographic primitives used to implement low-cost device authentication and secure secret key generation. Weak PUFs (i.e., devices able to generate a single signature or to deal with a...
A Survey on Chip to System Reverse Engineering
Shahed E. Quadir, Junlin Chen, Domenic Forte, Navid Asadizanjani, Sina Shahbazmohamadi, Lei Wang, John Chandy, Mark Tehranipoor
Article No.: 6
The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions. To inhibit RE for those with dishonest intentions (e.g., piracy and counterfeiting), it is important that the community is aware of the...
The development of cryptographic devices was followed by the development of so-called implementation attacks, which are intended to retrieve secret information exploiting the hardware itself. Among these attacks, fault attacks can be used to...
A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure
Alessandro Barenghi, Guido M. Bertoni, Luca Breveglieri, Gerardo Pelosi, Stefano Sanfilippo, Ruggero Susella
Article No.: 8
Elliptic curve cryptosystems proved to be well suited for securing systems with constrained resources like embedded and portable devices. In a fault-based attack, errors are induced during the computation of a cryptographic primitive, and the...
Beat Frequency Detector--Based High-Speed True Random Number Generators: Statistical Modeling and Analysis
Yingjie Lao, Qianying Tang, Chris H. Kim, Keshab K. Parhi
Article No.: 9
True random number generators (TRNGs) are crucial components for the security of cryptographic systems. In contrast to pseudo--random number generators (PRNGs), TRNGs provide higher security by extracting randomness from physical phenomena. To...
Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques
Amey Kulkarni, Youngok Pino, Matthew French, Tinoosh Mohsenin
Article No.: 10
In this article, we propose a real-time anomaly detection framework for an NoC-based many-core architecture. We assume that processing cores and memories are safe and anomaly is included through a communication medium (i.e., router). The article...
Gates vs. Splitters: Contradictory Optimization Objectives in the Synthesis of Optical Circuits
Arighna Deb, Robert Wille, Oliver Keszöcze, Stefan Hillmich, Rolf Drechsler
Article No.: 11
Optical circuits are considered a promising emerging technology for applications in ultra-high-speed networks or interconnects. However, the development of (automatic) synthesis approaches for such circuits is still in its infancy. Although first...