Hardware Support for the Security of Computing Devices

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (15 February 2021) | Viewed by 5806

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electrical and Computer Engineering, Seoul National University, Seoul 08826, Korea
Interests: software and systems security; hardware support for the security of computing devices; intelligent security; secure AI
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, Hanyang University, Seoul 04763, Korea
Interests: systems security; software security; trusted execution environments

Special Issue Information

Dear Colleagues,

Ever-increasing on-chip transistor budgets give opportunities to explore hardware-supported security systems. Security mechanisms based on hardware implementation give rise to a series of benefits. First of all, hardware-based security mechanisms are generally more efficient than software-based ones in terms of performance and energy. Considering that security solutions innately impose a performance burden on the system, such efficiency would be a great advantage favoring hardware over pure software in implementing security mechanisms. Further, hardware is one system component that is typically immutable and hard to manipulate. Therefore, by leveraging hardware support, security mechanisms tend to be more robust against attempts to neutralize them. Furthermore, hardware provides an unmatched visibility to program execution in a transparent manner, paving the way for developing novel security mechanisms. In this Special Issue, we invite original articles that deal with security issues on computing devices by taking all these advantages of hardware support for security.

Prof. Dr. Yunheung Paek
Prof. Dr. Yeongpil Cho
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Secure processor architectures and implementations
  • Hardware-based security monitoring systems
  • Side-channel attacks, evaluations, and defenses
  • Hardware-based trusted execution environments and security solutions
  • Hardware support for secure cloud/IoT
  • Cryptographic hardware design and implementation
  • Simulation, testing, and verification for hardware-based security systems

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 2696 KiB  
Article
On Multi-Scalar Multiplication Algorithms for Register-Constrained Environments
by Da-Zhi Sun, Ji-Dong Zhong, Hong-De Zhang and Xiang-Yu Guo
Electronics 2021, 10(5), 605; https://doi.org/10.3390/electronics10050605 - 5 Mar 2021
Cited by 1 | Viewed by 2335
Abstract
A basic but expensive operation in the implementations of several famous public-key cryptosystems is the computation of the multi-scalar multiplication in a certain finite additive group defined by an elliptic curve. We propose an adaptive window method for the multi-scalar multiplication, which aims [...] Read more.
A basic but expensive operation in the implementations of several famous public-key cryptosystems is the computation of the multi-scalar multiplication in a certain finite additive group defined by an elliptic curve. We propose an adaptive window method for the multi-scalar multiplication, which aims to balance the computation cost and the memory cost under register-constrained environments. That is, our method can maximize the computation efficiency of multi-scalar multiplication according to any small, fixed number of registers provided by electronic devices. We further demonstrate that our method is efficient when five registers are available. Our method is further studied in detail in the case where it is combined with the non-adjacent form (NAF) representation and the joint sparse form (JSF) representation. One efficiency result is that our method with the proposed improved NAF n-bit representation on average requires 209n/432 point additions. To the best of our knowledge, this efficiency result is optimal compared with those of similar methods using five registers. Unlike the previous window methods, which store all possible values in the window, our method stores those with comparatively high probabilities to reduce the number of required registers. Full article
(This article belongs to the Special Issue Hardware Support for the Security of Computing Devices)
Show Figures

Figure 1

18 pages, 4631 KiB  
Article
Enhancing Security on IoT Devices via Machine Learning on Conditional Power Dissipation
by Dimitrios Myridakis, Stefanos Papafotikas, Konstantinos Kalovrektis and Athanasios Kakarountas
Electronics 2020, 9(11), 1799; https://doi.org/10.3390/electronics9111799 - 29 Oct 2020
Cited by 2 | Viewed by 2755
Abstract
The rapid development of connected devices and the sensitive data, which they produce, is a major challenge for manufacturers seeking to fully protect their devices from attack. Consumers expect their IoT devices and data to be adequately protected against a wide range of [...] Read more.
The rapid development of connected devices and the sensitive data, which they produce, is a major challenge for manufacturers seeking to fully protect their devices from attack. Consumers expect their IoT devices and data to be adequately protected against a wide range of vulnerabilities and exploits. Successful attacks target IoT devices, cause security problems, and pose new challenges. Successful attacks from botnets residing on mastered IoT devices increase significantly in number and the severity of the damage they cause is similar to that of a war. The characteristics of attacks vary widely from attack to attack and from time to time. The warnings about the severity of the attacks indicate that there is a need for solutions to address the attacks from birth. In addition, there is a need to quarantine infected IoT devices, preventing the spread of the virus and thus the formation of the botnet. This work introduces the exploitation of side-channel attack techniques to protect the low-cost smart devices intuitively, and integrates a machine learning-based algorithm for Intrusion Detection, exploiting current supply characteristic dissipation. The results of this work showed successful detection of abnormal behavior of smart IoT devices. Full article
(This article belongs to the Special Issue Hardware Support for the Security of Computing Devices)
Show Figures

Figure 1

Back to TopTop