Flash-Based Security Primitives: Evolution, Challenges and Future Directions

Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of...

Full description

Bibliographic Details
Main Authors: Holden Gordon, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, Fatemeh Tehranipoor
Format: Article
Language:English
Published: MDPI AG 2021-02-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/5/1/7
_version_ 1797415100269723648
author Holden Gordon
Jack Edmonds
Soroor Ghandali
Wei Yan
Nima Karimian
Fatemeh Tehranipoor
author_facet Holden Gordon
Jack Edmonds
Soroor Ghandali
Wei Yan
Nima Karimian
Fatemeh Tehranipoor
author_sort Holden Gordon
collection DOAJ
description Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true random number generators (TRNGs), and integrated circuit (IC) counterfeit detection. In this paper, we evaluate the efficacy of flash memory-based security primitives and categorize them based on the process variations they exploit, as well as other features. We also compare and evaluate flash-based security primitives in order to identify drawbacks and essential design considerations. Finally, we describe new directions, challenges of research, and possible security vulnerabilities for flash-based security primitives that we believe would benefit from further exploration.
first_indexed 2024-03-09T05:44:09Z
format Article
id doaj.art-6c8e68db2cc747e9a7cd90e173561b3c
institution Directory Open Access Journal
issn 2410-387X
language English
last_indexed 2024-03-09T05:44:09Z
publishDate 2021-02-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj.art-6c8e68db2cc747e9a7cd90e173561b3c2023-12-03T12:22:55ZengMDPI AGCryptography2410-387X2021-02-0151710.3390/cryptography5010007Flash-Based Security Primitives: Evolution, Challenges and Future DirectionsHolden Gordon0Jack Edmonds1Soroor Ghandali2Wei Yan3Nima Karimian4Fatemeh Tehranipoor5Electrical and Computer Engineering, Santa Clara University, Santa Clara, CA 95053, USAElectrical and Computer Engineering, Santa Clara University, Santa Clara, CA 95053, USAElectrical and Computer Engineering, Santa Clara University, Santa Clara, CA 95053, USAElectrical and Computer Engineering, Clarkson University, Potsdam, NY 13699, USAComputer Engineering, San Jose State University, San Jose, CA 95192, USAElectrical and Computer Engineering, Santa Clara University, Santa Clara, CA 95053, USAOver the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true random number generators (TRNGs), and integrated circuit (IC) counterfeit detection. In this paper, we evaluate the efficacy of flash memory-based security primitives and categorize them based on the process variations they exploit, as well as other features. We also compare and evaluate flash-based security primitives in order to identify drawbacks and essential design considerations. Finally, we describe new directions, challenges of research, and possible security vulnerabilities for flash-based security primitives that we believe would benefit from further exploration.https://www.mdpi.com/2410-387X/5/1/7flash memoryflash-based physical unclonable functionphysical unclonable function (PUF)true random number generator (TRNG)integrated circuit counterfeit detectionhardware security primitives
spellingShingle Holden Gordon
Jack Edmonds
Soroor Ghandali
Wei Yan
Nima Karimian
Fatemeh Tehranipoor
Flash-Based Security Primitives: Evolution, Challenges and Future Directions
Cryptography
flash memory
flash-based physical unclonable function
physical unclonable function (PUF)
true random number generator (TRNG)
integrated circuit counterfeit detection
hardware security primitives
title Flash-Based Security Primitives: Evolution, Challenges and Future Directions
title_full Flash-Based Security Primitives: Evolution, Challenges and Future Directions
title_fullStr Flash-Based Security Primitives: Evolution, Challenges and Future Directions
title_full_unstemmed Flash-Based Security Primitives: Evolution, Challenges and Future Directions
title_short Flash-Based Security Primitives: Evolution, Challenges and Future Directions
title_sort flash based security primitives evolution challenges and future directions
topic flash memory
flash-based physical unclonable function
physical unclonable function (PUF)
true random number generator (TRNG)
integrated circuit counterfeit detection
hardware security primitives
url https://www.mdpi.com/2410-387X/5/1/7
work_keys_str_mv AT holdengordon flashbasedsecurityprimitivesevolutionchallengesandfuturedirections
AT jackedmonds flashbasedsecurityprimitivesevolutionchallengesandfuturedirections
AT soroorghandali flashbasedsecurityprimitivesevolutionchallengesandfuturedirections
AT weiyan flashbasedsecurityprimitivesevolutionchallengesandfuturedirections
AT nimakarimian flashbasedsecurityprimitivesevolutionchallengesandfuturedirections
AT fatemehtehranipoor flashbasedsecurityprimitivesevolutionchallengesandfuturedirections