2023
DOI: 10.1109/ojsscs.2022.3223274
|View full text |Cite
|
Sign up to set email alerts
|

Aggressive Design Reuse for Ubiquitous Zero-Trust Edge Security—From Physical Design to Machine-Learning-Based Hardware Patching

Abstract: This work presents an overview of challenges and solid pathways towards ubiquitous and sustainable hardware security in next-generation silicon chips at the edge of distributed and connected systems (e.g., IoT, AIoT). As first challenge, the increasingly connected nature and the exponential proliferation of edge devices is unabatingly increasing the overall attack surface, making attacks easier and mandating ubiquitous security down to each edge node. At the same time, the necessity to incorporate zero-trust p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 103 publications
0
1
0
Order By: Relevance
“…It monitors the raw bits generated by entropy source, detects the presence of '0-bias' or '1-bias', then adaptively adds delay time between CLK1 and CLK1B to counter the bias and keep the raw entropy (The Shannon entropy of raw data) greater than 0.8. It comprises two parts, (1). Clock delay generator, (2).…”
Section: Adaptive Calibration Circuitmentioning
confidence: 99%
See 1 more Smart Citation
“…It monitors the raw bits generated by entropy source, detects the presence of '0-bias' or '1-bias', then adaptively adds delay time between CLK1 and CLK1B to counter the bias and keep the raw entropy (The Shannon entropy of raw data) greater than 0.8. It comprises two parts, (1). Clock delay generator, (2).…”
Section: Adaptive Calibration Circuitmentioning
confidence: 99%
“…True random number generator (TRNG) harvests entropy from physical stochastic processes to generate random bits. Low energy and high robustness TRNG is crucial in information security applications of edge devices for generating session keys, nonces, and initialization vectors [1]. In addition to supporting hardware security, TRNG is becoming attractive for non-Von-Neumann computing architecture, such as stochastic computing [2] and neuromorphic computing [3], in which large amounts of random bits are required.…”
Section: Introductionmentioning
confidence: 99%
“…1) sustain the Internet of Things in its scaleup toward the trillions of connected devices by removing its economic, logistical and environmental sustainability roadblocks [6]; 2) manage a wider range of transactions with distributed ledgers (e.g., blockchain); 3) enable ubiquitous zero-trust edge security even at the lower end (and cost) of connected devices [7]; 4) make vehicles truly autonomous, connected and collaborative; 5) enhance the human body with new capabilities with augmented senses and powers (e.g., multiscale vision, multimodal sense fusion); 6) make intelligent and assistive robots part of our daily life; 7) enable distributed machine intelligence from edge to cloud while expanding learning at the edge (e.g., wearable, biomedical devices, and smart objects); 8) make information gathering/funneling/retrieval (e.g., from sensors, databases, and web) proactive and context-aware, moving away from "pushing buttons" (i.e., having relevant information being pushed to us as recommendation systems currently do in much narrower applications); 9) sharing goods and services more responsibly, fairly, and efficiently (sharing economy), progressively decoupling socioeconomic progress from intensive use of resources (e.g., through objects augmented with inexpensive smart sensing and tracking); and many others. We have progressed on the above challenges, and they certainly remain highly relevant for the coming years.…”
mentioning
confidence: 99%