Advancements in Hardware Security: Mitigating Emerging Cyber Threats

The field of hardware security is rapidly evolving to address the increasing sophistication of cyber attacks, particularly in the context of cloud services, smart devices, and IoT devices. Recent developments have focused on understanding and mitigating hardware security vulnerabilities through innovative approaches. These include the exploration of side-channel attacks, such as cache and power side-channel attacks, and the development of advanced techniques like Voltage Glitching and Electromagnetic Analysis. Memory encryption strategies, Cryptographic Instruction Set Architectures, Secure Boot, Root of Trust mechanisms, Physical Unclonable Functions (PUFs), and hardware fault injection techniques are also at the forefront of research efforts. Additionally, the unique security challenges of the RISC-V architecture have been a significant area of focus.

Noteworthy papers in this area include:

  • A comprehensive review of vulnerabilities and mitigation strategies in contemporary computing systems, highlighting the importance of building resilient hardware security solutions.
  • PUFBind, a novel low-overhead hardware-software co-design solution that utilizes PUFs for program binary authentication in FPGA-based embedded systems, demonstrating a successful prototype implementation.
  • EILID, a hybrid architecture ensuring software execution integrity on low-end IoT devices through active monitoring of control-flow violations, built atop a prevention-based hybrid Root-of-Trust.
  • A design-agnostic distributed timing fault injection monitor with end-to-end design automation, capable of detecting various types of clock glitches and timing fault injection attacks, verified in 65 nm CMOS technology.

Sources

Modern Hardware Security: A Review of Attacks and Countermeasures

PUFBind: PUF-Enabled Lightweight Program Binary Authentication for FPGA-based Embedded Systems

EILID: Execution Integrity for Low-end IoT Devices

Design-Agnostic Distributed Timing Fault Injection Monitor With End-to-End Design Automation

Built with on top of