Flash-Based Security Primitives: Evolution, Challenges and Future Directions
Autor: | Jack Edmonds, Fatemeh Tehranipoor, Nima Karimian, Holden Gordon, Soroor Ghandali, Wei Yan |
---|---|
Rok vydání: | 2021 |
Předmět: |
Hardware security module
flash-based physical unclonable function Exploit Computer Networks and Communications Process (engineering) Computer science Random number generation 02 engineering and technology Computer security computer.software_genre lcsh:Technology 01 natural sciences Flash memory flash memory Flash (photography) 0103 physical sciences 0202 electrical engineering electronic engineering information engineering integrated circuit counterfeit detection 010302 applied physics lcsh:T Applied Mathematics Fingerprint (computing) physical unclonable function (PUF) 020202 computer hardware & architecture Computer Science Applications Counterfeit Computational Theory and Mathematics true random number generator (TRNG) hardware security primitives computer Software |
Zdroj: | Cryptography, Vol 5, Iss 7, p 7 (2021) |
ISSN: | 2410-387X |
DOI: | 10.3390/cryptography5010007 |
Popis: | Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true random number generators (TRNGs), and integrated circuit (IC) counterfeit detection. In this paper, we evaluate the efficacy of flash memory-based security primitives and categorize them based on the process variations they exploit, as well as other features. We also compare and evaluate flash-based security primitives in order to identify drawbacks and essential design considerations. Finally, we describe new directions, challenges of research, and possible security vulnerabilities for flash-based security primitives that we believe would benefit from further exploration. |
Databáze: | OpenAIRE |
Externí odkaz: |