A Review on Hardware Security Countermeasures for IoT: Emerging Mechanisms and Machine Learning Solutions

Author(s):  
Emmanouel T. Michailidis ◽  
Dimitrios G. Kogias ◽  
Ioannis Voyiatzis
Author(s):  
Francesco Regazzoni ◽  
Shivam Bhasin ◽  
Amir Ali Pour ◽  
Ihab Alshaer ◽  
Furkan Aydin ◽  
...  

2018 ◽  
Vol 34 (2) ◽  
pp. 183-201 ◽  
Author(s):  
Rana Elnaggar ◽  
Krishnendu Chakrabarty

Author(s):  
Shijin Duan ◽  
Zhengang Li ◽  
Yukui Luo ◽  
Mengshu Sun ◽  
Wenhao Wang ◽  
...  

Author(s):  
Wenye Liu ◽  
Chip-Hong Chang ◽  
Xueyang Wang ◽  
Chen Liu ◽  
Jason Fung ◽  
...  

2021 ◽  
Vol 16 (2) ◽  
pp. 60-66
Author(s):  
Luis Diego Monge Solano

Satellite infrastructure plays a vital role in today's world. As more systems rely on this technology it increasingly becomes a target for security threats. The existence of such risks has been acknowledged internationally as more resources are allocated to their study and understanding. In this context, studying satellite technologies from a geospatial perspective has provided a situational awareness understanding of the technology ecosystem and its strengths, limitations, and vulnerabilities. New technologies such as artificial intelligence, machine learning, and blockchain must be studied to generate security countermeasures for satellite technologies.


10.29007/nbm3 ◽  
2019 ◽  
Author(s):  
Fatemeh Ganji ◽  
Shahin Tajik ◽  
Pascal Stauss ◽  
Jean-Pierre Seifert ◽  
Domenic Forte ◽  
...  

The era of PUFs has been characterized by the efforts put into research and the devel- opment of PUFs that are resilient against attacks, in particular, machine learning (ML) attacks. Due to the lack of systematic and provable methods for this purpose, we have witnessed the ever-continuing competition between PUF designers/ manufacturers, crypt- analysts, and of course, adversaries that maliciously break the security of PUFs. This is despite a series of acknowledged principles developed in cryptography and complexity theory, under the umbrella term “hardness amplification”. This paper aims at narrowing the gap between these studies and hardware security, specifically for applications in the domain of PUFs. To this end, this paper provides an example of somewhat hard PUFs and demonstrates how to build a strongly secure construction out of these considerably weaker primitives. Our theoretical findings are discussed in an exhaustive manner and supported by the silicon results captured from real-world PUFs.


Sign in / Sign up

Export Citation Format

Share Document