ABSTRACT

178Hardware security has become an increasing concern in today's world, where securing only software and protocols has become insufficient. More than a decade of research in this area has yielded many security primitives and applications to aid different aspects of hardware security [1]. This includes primitives such as physical unclonable functions (PUFs) and true random number generators (TRNGs) for cryptographic key generation and resisting emerging threats such as IC piracy and counterfeiting.