Abstract
On one hand, traditionally, secure systems rely on hardware to store the keys for cryptographic protocols. Such an approach is becoming increasingly insecure, due to hardware-intrinsic vulnerabilities. A physical unclonable function (PUF) is a security primitive that exploits inherent hardware properties to generate keys on the fly, instead of storing them. On the other hand, the integrated circuit (IC) design flow is globalized due to increase in design, fabrication, testing, and verification costs. While globalization has provided cost benefits and reduced the time-to-market, it has introduced several attacks such as piracy, malicious modifications, and counterfeiting. To thwart these attacks, researchers have developed techniques that modify the designs and include additional components into the design. Such techniques are collectively called intellectual property (IP) protection techniques. In this chapter, we describe two classes of hardware security techniques: PUFs and IP protection techniques.
Original language | English (US) |
---|---|
Title of host publication | Fundamentals of IP and SoC Security |
Subtitle of host publication | Design, Verification, and Debug |
Publisher | Springer International Publishing |
Pages | 199-222 |
Number of pages | 24 |
ISBN (Electronic) | 9783319500577 |
ISBN (Print) | 9783319500553 |
DOIs | |
State | Published - Jan 1 2017 |
ASJC Scopus subject areas
- General Engineering
- General Computer Science