{"id":50,"date":"2021-11-25T08:50:29","date_gmt":"2021-11-25T08:50:29","guid":{"rendered":"http:\/\/box5801.temp.domains\/~greenico\/?page_id=50"},"modified":"2024-01-24T14:21:35","modified_gmt":"2024-01-24T14:21:35","slug":"hardware-security-database-hwsecdb","status":"publish","type":"page","link":"https:\/\/www.green-ic.org\/hardware-security-database-hwsecdb\/","title":{"rendered":"Hardware Security database (HWsecdb)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"50\" class=\"elementor elementor-50\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71726494 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71726494\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66d062d8\" data-id=\"66d062d8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5362240d elementor-widget elementor-widget-text-editor\" data-id=\"5362240d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>Database of Silicon Primitives for Hardware Security (HWsecdb)<\/strong><\/p>\n<p><\/p>\n<p>The HWsecdb database collects thorough and up-to-date information on state-of-the-art silicon demonstrations of primitives for hardware security, and related performance figures.We hope this will be useful to our community, help keep track of the continuous advances and acknowledge the fine work of our colleagues who push the boundaries in the field.Silicon demonstrations from leading journals and conferences in the circuits area are being tracked\u00a0for the following primitives:<\/p>\n<p><\/p>\n<ul class=\"wp-block-list\">\n<li>Physically Unclonable Functions (PUF)<\/li>\n<li>True Random Numbers Generators (TRNG)<\/li>\n<li>private-key cryptographic engines<\/li>\n<li>public key cryptographic engines<\/li>\n<li>other cryptographic engines (e.g., hashing, key exchange, digital signature)<\/li>\n<li>defense mechanisms to counteract physical attacks<\/li>\n<\/ul>\n<p><\/p>\n<p><strong>HWsecdb spreadsheet<\/strong><\/p>\n<p><\/p>\n<p>You can download the spreadsheet containing the HWsecdb <a href=\"https:\/\/www.green-ic.org\/wp-content\/uploads\/2022\/01\/HWsecdb_25_Jan_2024.xlsx\">here<\/a>\u00a0(updated on Jan 24, 2024).The spreadsheet also includes the analysis of trends (e.g., energy, area), as well as the previously available <a href=\"https:\/\/www.green-ic.org\/physically-unclonable-function-database-pufdb\/\" target=\"_blank\" rel=\"noopener\">PUF database<\/a>\u00a0(now superseded by the HWsecdb database).<\/p>\n<p><\/p>\n<p>For use in publications and presentations please cite this data collection as follows:<\/p>\n<p><b>M. Alioto, \u201cHW security primitives Green IC database,&#8221; [Online]. Available:\u00a0<a href=\"https:\/\/www.green-ic.org\/hardware-security-database-hwsecdb\/\"><em>https:\/\/www.green-ic.org\/hwsecdb<\/em><\/a>\u00a0<\/b><\/p>\n<p><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\">(major overhaul of previous version:\u00a0<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\">M. Alioto, S. Taneja, \u201cHW security primitives Green IC database&#8221;<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\">)<\/span><\/p>\n<p>\u00a0<\/p>\n<p><\/p>\n<p><strong>For authors of new primitives for HW security and papers with experimental validation<\/strong><\/p>\n<p><\/p>\n<p>Authors of new primitives who wish their silicon demonstrations to be included in the future revisions of this database can send an email to\u00a0<a href=\"https:\/\/www.green-ic.org\/contacts-and-location\/\" target=\"_blank\" rel=\"noopener\">Prof. Alioto<\/a>\u00a0and attach the following pieces of information:<\/p>\n<p><\/p>\n<ul class=\"wp-block-list\">\n<li>reference of the publication presenting the primitive<\/li>\n<li>performance and numerical data based on the figures of merit used in the above spreadsheet.<\/li>\n<\/ul>\n<p><\/p>\n<p>Any comment\/suggestion on how to improve this page and the spreadsheet is welcome.<\/p>\n<p><\/p>\n<p>\u00a0<\/p>\n<p><strong>Exploring further<\/strong><\/p>\n<p><\/p>\n<p>As further sources of information, please refer to:<\/p>\n<p><\/p>\n<ul class=\"wp-block-list\">\n<li>our forum talk on HW security for intelligent sensing at ISSCC 2024 (&#8220;F4: Intelligent Sensing&#8221;)<\/li>\n<li>our invited overview paper: M. Alioto, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9955388\" target=\"_blank\" rel=\"noopener\">Aggressive Design Reuse for Ubiquitous Zero-Trust Edge Security \u2013 From Physical Design to Machine Learning-Based Hardware Patching<\/a>,\u201d IEEE Open Journal of the Solid-State Circuits Society (invited), vol. 3, pp. 1-16, 2023<\/li>\n<li>our forum on HW security at\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=9731690\">ISSCC 2022<\/a>\u00a0(&#8220;F6: Computer Systems Under Attack &#8211; Paying the Performance Price for Protection&#8221;) with following speakers: Serge Leef (DARPA), Todd Austin (UMich), Carlos Rozas (Intel), Dongkyun Kim (SK hynix), Ruby Lee (Princeton), Ileana Buhan (Radboud University), Noriyuki Miura (Osaka University), Sujoy Sinha Roy (Graz University)<\/li>\n<li>our tutorial on HW security at\u00a0<a href=\"https:\/\/www.isscc.org\/2019\/program\/tutorials\/\" target=\"_blank\" rel=\"noreferrer noopener\">ISSCC 2019<\/a>\u00a0(see ISSCC materials, and soon through the media content offered by the IEEE Solid-State Circuits Society)<\/li>\n<li>our tutorial on entropy generation for ubiquitous security at\u00a0<a href=\"https:\/\/www.esscirc-essderc2021.org\/hardware-security\" target=\"_blank\" rel=\"noreferrer noopener\">ESSCIRC 2021<\/a><\/li>\n<li>our surveys on primitives\u00a0for HW security\n<ul>\n<li>M. Alioto, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8811774\" target=\"_blank\" rel=\"noreferrer noopener\">Trends in Hardware Security: from Basics to ASICs<\/a>,&#8221; IEEE Solid-State Circuits Magazine (invited), vol. 11, no. 3, pp. 56-74, Aug. 2019<\/li>\n<li>M. Alioto, S. Taneja, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8780123\" target=\"_blank\" rel=\"noreferrer noopener\">Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems<\/a>,\u201d in Proc. of\u00a0<em>IEEE CICC 2019<\/em>\u00a0(invited), Austin (USA), April 2019<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Database of Silicon Primitives for Hardware Security (HWsecdb) The HWsecdb database collects thorough and up-to-date information on state-of-the-art silicon demonstrations of primitives for hardware security, and related performance figures.We hope this will be useful to our community, help keep track of the continuous advances and acknowledge the fine work of our colleagues who push the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","om_disable_all_campaigns":false,"footnotes":""},"class_list":["post-50","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.green-ic.org\/wp-json\/wp\/v2\/pages\/50","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.green-ic.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.green-ic.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.green-ic.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.green-ic.org\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":5,"href":"https:\/\/www.green-ic.org\/wp-json\/wp\/v2\/pages\/50\/revisions"}],"predecessor-version":[{"id":3370,"href":"https:\/\/www.green-ic.org\/wp-json\/wp\/v2\/pages\/50\/revisions\/3370"}],"wp:attachment":[{"href":"https:\/\/www.green-ic.org\/wp-json\/wp\/v2\/media?parent=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}