Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks

View through CrossRef
The increasing reliance on hardware technologies across critical sectors such as healthcare, defense, automotive, and finance has raised awareness of vulnerabilities in these systems. Threats like hardware Trojans (HTs), side-channel attacks (SCAs), and cloning compromise data security, disrupt operations and jeopardize trust in interconnected systems. Addressing these risks requires robust hardware security mechanisms.This survey provides a comprehensive analysis of advancements in hardware security, focusing on Physically Unclonable Functions (PUFs), hardware Trojan detection techniques, and defenses against side-channel attacks. PUFs leverage manufacturing variations for device-specific authentication and cryptographic key generation. Hardware Trojan detection mitigates malicious modifications in integrated circuits, while side-channel defenses counteract attacks exploiting information leakage like power consumption and electromagnetic emissions. A novel AI-driven hybrid PUF model is proposed to address environmental variability, machine learning-based modeling attacks, and scalability challenges.Drawing from recent studies, this paper categorizes threats, explores detection methodologies, and evaluates lightweight security protocols for resource-constrained environments like IoT devices. Emphasizing machine learning-enhanced detection, hybrid cryptographic techniques, and dynamic PUF designs, it highlights innovations for enhancing hardware security. Future directions include quantum-resilient architectures, energy-efficient implementations, and scalable regulatory frameworks, offering a roadmap to secure next-generation hardware systems against evolving threats.
Title: Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks
Description:
The increasing reliance on hardware technologies across critical sectors such as healthcare, defense, automotive, and finance has raised awareness of vulnerabilities in these systems.
Threats like hardware Trojans (HTs), side-channel attacks (SCAs), and cloning compromise data security, disrupt operations and jeopardize trust in interconnected systems.
Addressing these risks requires robust hardware security mechanisms.
This survey provides a comprehensive analysis of advancements in hardware security, focusing on Physically Unclonable Functions (PUFs), hardware Trojan detection techniques, and defenses against side-channel attacks.
PUFs leverage manufacturing variations for device-specific authentication and cryptographic key generation.
Hardware Trojan detection mitigates malicious modifications in integrated circuits, while side-channel defenses counteract attacks exploiting information leakage like power consumption and electromagnetic emissions.
A novel AI-driven hybrid PUF model is proposed to address environmental variability, machine learning-based modeling attacks, and scalability challenges.
Drawing from recent studies, this paper categorizes threats, explores detection methodologies, and evaluates lightweight security protocols for resource-constrained environments like IoT devices.
Emphasizing machine learning-enhanced detection, hybrid cryptographic techniques, and dynamic PUF designs, it highlights innovations for enhancing hardware security.
Future directions include quantum-resilient architectures, energy-efficient implementations, and scalable regulatory frameworks, offering a roadmap to secure next-generation hardware systems against evolving threats.

Related Results

Jupiter Trojans spectrophotometry using GAIA DR3
Jupiter Trojans spectrophotometry using GAIA DR3
Introduction Jupiter trojans have a red spectral behaviour typically associated with the presence of organics, which have been recently detected on Lucy mission Trojans targets tha...
En skvatmølle i Ljørring
En skvatmølle i Ljørring
A Horizontal Mill at Ljørring, Jutland.Horizontal water-mills have been in use in Jutland since the beginning of the Christian era 2). But the one here described shows so close a c...
A Survey on AI-Augmented Secure RTL Design for Hardware Trojan Prevention
A Survey on AI-Augmented Secure RTL Design for Hardware Trojan Prevention
Once, discreet circuit elements, called components, were heaped up on boards inside steel cages using wire-lead technology in just five short years. Fast forward to today, and your...
A survey on AI-augmented Secure RTL design for hardware trojan prevention
A survey on AI-augmented Secure RTL design for hardware trojan prevention
Once, discrete circuit elements, called components, were heaped up on boards inside steel cages using wire-lead technology in just five short years. Fast forward to today, and your...
Cellulose-Based Polyurethane Foams of Low Flammability
Cellulose-Based Polyurethane Foams of Low Flammability
Decreasing oil resources creates the need to search for raw materials in the biosphere, which can be converted into polyols suitable for obtaining polyurethane foams (PUF). One suc...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
A Highly Reliable Reconfigurable SRAM PUF Based on Error Correction Codes and Capacitor Preselection
A Highly Reliable Reconfigurable SRAM PUF Based on Error Correction Codes and Capacitor Preselection
In recent years, researchers have extensively utilized the inherent variations occurring during the manufacturing process of integrated circuits to create physical unclonable funct...
Performance simulation methodologies for hardware/software co-designed processors
Performance simulation methodologies for hardware/software co-designed processors
Recently the community started looking into Hardware/Software (HW/SW) co-designed processors as potential solutions to move towards the less power consuming and the less complex de...

Back to Top