Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs
by Hamza Al Maharmeh; Mohammad Alhawari; Chung-Chih Hung; Mohammed Ismail
International Journal of Multimedia Intelligence and Security (IJMIS), Vol. 3, No. 3, 2019

Abstract: Hardware security threats have gained a tremendous attention where extensive research efforts have been expended toward developing effective countermeasures. These threats can be categorised into five main attacks which are: reverse engineering, side-channel analysis, intellectual property (IP) cores piracy/IC overbuilding, counterfeiting, and hardware Trojans. This paper investigates the most efficient state-of-the-art techniques that are used to thwart main hardware attacks. Reported work in the literature proposed various countermeasures, where obfuscation, camouflaging, and physically unclonable functions (PUFs) are considered the most powerful and effective methods. In obfuscation technique, the chip will be locked and it will not function properly unless the correct secret key is supplied. This paper addresses also camouflaging countermeasure which is a layout-based technique that is used to protect IP cores. Additionally, this paper provides a detailed study on silicon PUFs, where they can be classified into weak and strong PUFs. In this paper, various PUF architectures will be discussed along with the design constraints.

Online publication date: Fri, 31-Jan-2020

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Multimedia Intelligence and Security (IJMIS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com