1. Security Down to the Hardware Level
- Author
-
Anastacia B. Alvarez and Massimo Alioto
- Subjects
010302 applied physics ,Hardware security module ,medicine.medical_specialty ,Computer science ,business.industry ,Computer security compromised by hardware failure ,Cryptography ,02 engineering and technology ,Computer security model ,Computer security ,computer.software_genre ,01 natural sciences ,020202 computer hardware & architecture ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Power analysis ,Security service ,Software security assurance ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Hardware compatibility list ,business ,computer - Abstract
This chapter introduces the concept of Physically Unclonable Functions (PUFs), their prospects for hardware security in IoT devices, and their interaction with traditional cryptography. Section 8.1 summarizes the background on PUFs, whereas Sect. 8.2 covers the metrics that are commonly used to evaluate PUF performance. Such metrics are used to comparatively review the state of the art on PUFs in Sect. 8.3. Section 8.4 covers vulnerabilities to malicious attacks attempting to clone or mimic a PUF. In the last section, we introduce the novel concept of PUF-enhanced cryptography as a promising direction aiming to merge PUFs and cryptography in a cohesive framework for IoT hardware-level security.
- Published
- 2017
- Full Text
- View/download PDF