Hardware Security Exploiting Post-CMOS Devices: Fundamental Device Characteristics, State-of-the-Art Countermeasures , Challenges and Roadmap

被引:18
|
作者
Japa, Aditya [1 ]
Majumder, Manoj Kumar [1 ]
Sahoo, Subhendu K. [2 ]
Vaddi, Ramesh [3 ]
Kaushik, Brajesh Kumar [4 ]
机构
[1] DSPM Int Inst Informat Technol, Dept Elect & Commun, Naya Raipur 493661, Chhattisgarh, India
[2] Birla Inst Technol & Sci, Dept Elect & Elect Engn, Hyderabad 500078, India
[3] SRM Univ, Sch Engn & Appl Sci, Dept Elect & Commun, Guntur 522502, Andhra Pradesh, India
[4] Indian Inst Technol Roorkee, Dept Elect & Commun Engn, Roorkee 247667, Uttar Pradesh, India
关键词
RANDOM-NUMBER GENERATOR; PHASE-CHANGE MEMORY; PHYSICALLY UNCLONABLE FUNCTION; DIFFERENTIAL POWER ANALYSIS; LOGIC OBFUSCATION; ENERGY-EFFICIENT; DESIGN; DPA; CIRCUIT; PUF;
D O I
10.1109/MCAS.2021.3092532
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing hardware-oriented security and trust. However, implementing hardware security primitives and methodologies requires large area overhead and power consumption. Furthermore, emerging new attack models and vulnerabilities are regularly evolving and cannot be adequately addressed by current CMOS technology. This paper for the first time presents a comprehensive review of numerous post-CMOS technologies based hardware security primitives and methodologies, particularly true random number generators, physically unclonable functions, side-channel analysis countermeasures, and hardware obfuscation techniques. Various beyond-CMOS device technologies including tunneling FET (TFET), hybrid phase transition FET (HyperFET), carbon nanotube FET (CNTFET), silicon nanowire FET (SiNWFET), symmetrical tunneling FET (SymFET), phase-change memory (PCM), spin-transfer torque magnetic tunnel junction (STT-MTJ), resistive random access memory (RRAM) have been considered in this study. First, the basic principle of operation and unusual characteristics of nanoelectronic devices used for hardware security applications have been extensively discussed. Later, CMOS technology challenges and benefits of emerging nanotechnologies for the design of hardware security primitives and methodologies have been reported. Finally, different analyses have been presented to demonstrate the promising performance of post-CMOS devices over the current CMOS technology in different countermeasures. Additionally, challenges, future directions, and plans have been presented to achieve more research outcomes in this field.
引用
收藏
页码:4 / 30
页数:27
相关论文
共 2 条
  • [1] Neural Tissue and Brain Interfacing CMOS Devices - An Introduction to State-of-the-Art, Current and Future Challenges -
    Thewes, Roland
    Bertotti, Gabriel
    Dodel, Norman
    Keil, Stefan
    Schroeder, Sven
    Boven, Karl-Heinz
    Zeck, Guenther
    Mahmud, Mufti
    Vassanelli, Stefano
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1826 - 1829
  • [2] A State-of-the-Art Reverse Engineering Approach for Combating Hardware Security Vulnerabilities at the System and PCB Level in IoT Devices
    Sharma, Arvind
    Dyrkolbotn, Geir Olav
    Overlier, Lasse
    Waltoft-Olsen, Andre Jung
    Franke, Katrin
    Katsikas, Sokratis
    2022 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS (PAINE), 2022, : 1 - 7