RRAM-based hardware security primitives

Shimeng Yu, Xiaoyu Sun, Rui Liu, Huaqiang Wu, Yachuan Pang, Bin Gao, He Qian, An Chen

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Our society has become increasingly dependent on electronic information exchange between personal devices and network servers. New ways of buying and paying, such as electronic-commerce and mobile-banking, have become popular. Unfortunately, the security of such transactions is constantly being challenged. In spite of the recent advances in network and cloud security, there have been several identity and secure information leaks in Target, Home Depot, Apple and Sony Pictures Entertainment, etc. [1]. Many of the security breaches are due to insecure access channels to the cloud. An adversary can obtain user credentials through a counterfeited device and access the74 cloud from anywhere. The security problem is likely to be exacerbated in the Internet-of-things (IoT) era where millions of devices in our homes, offices, and cars are digitally connected. It is estimated that the number of connected devices will reach 50 billion in 2020 [2]. Every connected IoT device provides more attack possibilities and adds to the potential risk. Thus, security has to be built into all layers of the system from network and cloud layers to the IoT hardware layer. Adding to the complexity is the fact that the integrated circuit (IC)'s global and distributed supply chain has introduced hardware-based security issues, such as hardware Trojans, intellectual property (IP) piracy and IC overbuilding, reverse engineering, counterfeiting, etc. [3]. Thus, hardware trustworthiness is even more important in the IoT era. Each IoT device should be equipped with a unique device signature that can be used for authentication by the cloud [4].

Original languageEnglish (US)
Title of host publicationSecurity Opportunities in Nano Devices and Emerging Technologies
PublisherCRC Press
Pages73-92
Number of pages20
ISBN (Electronic)9781351965903
ISBN (Print)9781138035775
DOIs
StatePublished - Jan 1 2017

Fingerprint

Hardware
Integrated circuits
Reverse engineering
Intellectual property
Electronic commerce
Authentication
Supply chains
Railroad cars
Servers
Hardware security
Internet of things
RRAM

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Yu, S., Sun, X., Liu, R., Wu, H., Pang, Y., Gao, B., ... Chen, A. (2017). RRAM-based hardware security primitives. In Security Opportunities in Nano Devices and Emerging Technologies (pp. 73-92). CRC Press. https://doi.org/10.1201/9781315265056

RRAM-based hardware security primitives. / Yu, Shimeng; Sun, Xiaoyu; Liu, Rui; Wu, Huaqiang; Pang, Yachuan; Gao, Bin; Qian, He; Chen, An.

Security Opportunities in Nano Devices and Emerging Technologies. CRC Press, 2017. p. 73-92.

Research output: Chapter in Book/Report/Conference proceedingChapter

Yu, S, Sun, X, Liu, R, Wu, H, Pang, Y, Gao, B, Qian, H & Chen, A 2017, RRAM-based hardware security primitives. in Security Opportunities in Nano Devices and Emerging Technologies. CRC Press, pp. 73-92. https://doi.org/10.1201/9781315265056
Yu S, Sun X, Liu R, Wu H, Pang Y, Gao B et al. RRAM-based hardware security primitives. In Security Opportunities in Nano Devices and Emerging Technologies. CRC Press. 2017. p. 73-92 https://doi.org/10.1201/9781315265056
Yu, Shimeng ; Sun, Xiaoyu ; Liu, Rui ; Wu, Huaqiang ; Pang, Yachuan ; Gao, Bin ; Qian, He ; Chen, An. / RRAM-based hardware security primitives. Security Opportunities in Nano Devices and Emerging Technologies. CRC Press, 2017. pp. 73-92
@inbook{2d1fba6b4929439f949fc773fefde7fc,
title = "RRAM-based hardware security primitives",
abstract = "Our society has become increasingly dependent on electronic information exchange between personal devices and network servers. New ways of buying and paying, such as electronic-commerce and mobile-banking, have become popular. Unfortunately, the security of such transactions is constantly being challenged. In spite of the recent advances in network and cloud security, there have been several identity and secure information leaks in Target, Home Depot, Apple and Sony Pictures Entertainment, etc. [1]. Many of the security breaches are due to insecure access channels to the cloud. An adversary can obtain user credentials through a counterfeited device and access the74 cloud from anywhere. The security problem is likely to be exacerbated in the Internet-of-things (IoT) era where millions of devices in our homes, offices, and cars are digitally connected. It is estimated that the number of connected devices will reach 50 billion in 2020 [2]. Every connected IoT device provides more attack possibilities and adds to the potential risk. Thus, security has to be built into all layers of the system from network and cloud layers to the IoT hardware layer. Adding to the complexity is the fact that the integrated circuit (IC)'s global and distributed supply chain has introduced hardware-based security issues, such as hardware Trojans, intellectual property (IP) piracy and IC overbuilding, reverse engineering, counterfeiting, etc. [3]. Thus, hardware trustworthiness is even more important in the IoT era. Each IoT device should be equipped with a unique device signature that can be used for authentication by the cloud [4].",
author = "Shimeng Yu and Xiaoyu Sun and Rui Liu and Huaqiang Wu and Yachuan Pang and Bin Gao and He Qian and An Chen",
year = "2017",
month = "1",
day = "1",
doi = "10.1201/9781315265056",
language = "English (US)",
isbn = "9781138035775",
pages = "73--92",
booktitle = "Security Opportunities in Nano Devices and Emerging Technologies",
publisher = "CRC Press",

}

TY - CHAP

T1 - RRAM-based hardware security primitives

AU - Yu, Shimeng

AU - Sun, Xiaoyu

AU - Liu, Rui

AU - Wu, Huaqiang

AU - Pang, Yachuan

AU - Gao, Bin

AU - Qian, He

AU - Chen, An

PY - 2017/1/1

Y1 - 2017/1/1

N2 - Our society has become increasingly dependent on electronic information exchange between personal devices and network servers. New ways of buying and paying, such as electronic-commerce and mobile-banking, have become popular. Unfortunately, the security of such transactions is constantly being challenged. In spite of the recent advances in network and cloud security, there have been several identity and secure information leaks in Target, Home Depot, Apple and Sony Pictures Entertainment, etc. [1]. Many of the security breaches are due to insecure access channels to the cloud. An adversary can obtain user credentials through a counterfeited device and access the74 cloud from anywhere. The security problem is likely to be exacerbated in the Internet-of-things (IoT) era where millions of devices in our homes, offices, and cars are digitally connected. It is estimated that the number of connected devices will reach 50 billion in 2020 [2]. Every connected IoT device provides more attack possibilities and adds to the potential risk. Thus, security has to be built into all layers of the system from network and cloud layers to the IoT hardware layer. Adding to the complexity is the fact that the integrated circuit (IC)'s global and distributed supply chain has introduced hardware-based security issues, such as hardware Trojans, intellectual property (IP) piracy and IC overbuilding, reverse engineering, counterfeiting, etc. [3]. Thus, hardware trustworthiness is even more important in the IoT era. Each IoT device should be equipped with a unique device signature that can be used for authentication by the cloud [4].

AB - Our society has become increasingly dependent on electronic information exchange between personal devices and network servers. New ways of buying and paying, such as electronic-commerce and mobile-banking, have become popular. Unfortunately, the security of such transactions is constantly being challenged. In spite of the recent advances in network and cloud security, there have been several identity and secure information leaks in Target, Home Depot, Apple and Sony Pictures Entertainment, etc. [1]. Many of the security breaches are due to insecure access channels to the cloud. An adversary can obtain user credentials through a counterfeited device and access the74 cloud from anywhere. The security problem is likely to be exacerbated in the Internet-of-things (IoT) era where millions of devices in our homes, offices, and cars are digitally connected. It is estimated that the number of connected devices will reach 50 billion in 2020 [2]. Every connected IoT device provides more attack possibilities and adds to the potential risk. Thus, security has to be built into all layers of the system from network and cloud layers to the IoT hardware layer. Adding to the complexity is the fact that the integrated circuit (IC)'s global and distributed supply chain has introduced hardware-based security issues, such as hardware Trojans, intellectual property (IP) piracy and IC overbuilding, reverse engineering, counterfeiting, etc. [3]. Thus, hardware trustworthiness is even more important in the IoT era. Each IoT device should be equipped with a unique device signature that can be used for authentication by the cloud [4].

UR - http://www.scopus.com/inward/record.url?scp=85051801331&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85051801331&partnerID=8YFLogxK

U2 - 10.1201/9781315265056

DO - 10.1201/9781315265056

M3 - Chapter

AN - SCOPUS:85051801331

SN - 9781138035775

SP - 73

EP - 92

BT - Security Opportunities in Nano Devices and Emerging Technologies

PB - CRC Press

ER -