Hardware-Based Methods for Electronic Device Protection against Invasive and Non-Invasive Attacks
-
Published:2023-11-02
Issue:21
Volume:12
Page:4507
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Vidaković Marin1, Vinko Davor2ORCID
Affiliation:
1. Sedmi Odjel Ltd., 10000 Zagreb, Croatia 2. Random Red Ltd., 31000 Osijek, Croatia
Abstract
This paper reviews hardware-based protection methods for electronic devices, encompassing scientific publications and published patents. This review covers insights from the scientific community and innovative solutions patented in the industry. By combining these two sources, this paper offers a comprehensive and holistic review of electronic device security. Electronic devices are integral to modern life, but their widespread use invites security threats, both digital and physical. This paper reviews hardware-based protection methods against invasive and non-invasive attacks, emphasizing the importance of a dual approach through hardware design. Invasive attacks involve physical tampering, and we explore anti-tampering techniques such as conductive meshes, sensors and physically unclonable functions (PUFs). Non-invasive, side-channel attacks encompass various attack vectors, focusing on electromagnetic analysis. To counter these attacks, we analyze techniques like reducing and masking electromagnetic radiation. This paper bridges the gap between invasive and non-invasive attack mitigation. It underscores the necessity of a multifaceted approach to safeguard electronic devices in an interconnected world, preserving their reliability and functionality.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference89 articles.
1. Fournaris, A.P., Dimopoulos, C., Lampropoulos, K., and Koufopavlou, O. (2020). Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices. Sensors, 20. 2. Hao, Q., Zhang, Z., Xu, D., Wang, J., Liu, J., Zhang, J., Ma, J., and Wang, X. (2022). A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems. Appl. Sci., 12. 3. Lu, M.-C., Huang, Q.-X., Chiu, M.-Y., Tsai, Y.-C., and Sun, H.-M. (2022). PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion. Sensors, 22. 4. Wang, X., Zhao, Z., Xu, D., Zhang, Z., Hao, Q., Liu, M., and Si, Y. (2020). Two-Stage Checkpoint Based Security Monitoring and Fault Recovery Architecture for Embedded Processor. Electronics, 9. 5. Performance Analysis of Secure Elements for IoT;Noseda;IoT,2022
|
|