Hardware Security Book Series 2: PUF-based Solutions and Applications

Lead Author: Lawrence Liu

A portion of this book is based on the customer document package included in every set of deliverables from PUFsecurity. To make this book more accessible, all technical concepts and terms were examined to determine if they could be further expanded. The goal is to create an easy-to-follow guide for readers to understand the benefits of PUFs and how PUF-based solutions operate in a secure system.

After this important background information was established, the dual solutions of PUFrt and PUFcc from PUFsecurity were introduced before selected applications pulled from the growing fields of AI and IoT were described in detail to give readers practical examples of what PUF-based solutions can do in real-life scenarios. Originally created as part of a separate book on AI and IoT, the chapters related to applications were later incorporated into this book.

From the original book concept to the writing of this preface, almost two years have passed. Beginning with an outline of topics to cover and weathering three major rewrites and reorganizations, this book has finally been shaped into the form you have in your hands today. I hope reading this book is as rewarding as I have found writing it.

***

Table of contents

  1. Introduction
    1.1. Challenges and Threats
    1.2. Establishing and Building Trust
    1.3. Five Primary Cryptographic Functions
    1.4. Organization of this Book
    .
  2. Trends in Hardware Security
    2.1. Hardware Security as a System Requirement
    2.2. Data Security at Every Stage
    2.3. Product Lifecycle Protection
    2.4. Increased Adoption of Standards and Certifications
    .
  3. Hardware Root of Trust
    3.1. Root of Trust Anchors Secure Boot
    3.2. Differences Between PUF-based and Traditional Solutions
    3.3. Root of Trust Wishlist
    .
  4. PUFrt
    4.1. Design Philosophy
    4.2. Architecture of PUFrt
    4.3. PUFrt Block Descriptions
    4.4. PUFrt Operations
    .
  5. PUFcc
    5.1. Design Philosophy
    5.2. PUFcc Architecture
    5.3. PUFcc Block Descriptions
    5.4. PUFcc Operations
    5.5. Add-On Modules
    .
  6. PUF-based Chip Security for AI and IoT
    6.1. PUF-based Security for Artificial Intelligence
    6.2. PUF-based Security for the Internet of Things
    .
  7. Conclusion

    Download Document

    Share:

    Related Posts

    Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security
    Hardware Security Book Series 2: PUF-based Solutions and Applications
    Hardware Security Book Series 1: Quantum Tunneling PUF