Database of Silicon Primitives for Hardware Security (HWsecdb)
The HWsecdb database collects thorough and up-to-date information on state-of-the-art silicon demonstrations of primitives for hardware security, and related performance figures.We hope this will be useful to our community, help keep track of the continuous advances and acknowledge the fine work of our colleagues who push the boundaries in the field.Silicon demonstrations from leading journals and conferences in the circuits area are being tracked for the following primitives:
- Physically Unclonable Functions (PUF)
- True Random Numbers Generators (TRNG)
- private-key cryptographic engines
- public key cryptographic engines
- other cryptographic engines (e.g., hashing, key exchange, digital signature)
- defense mechanisms to counteract physical attacks
HWsecdb spreadsheet
You can download the spreadsheet containing the HWsecdb here (updated on Jan 24, 2024).The spreadsheet also includes the analysis of trends (e.g., energy, area), as well as the previously available PUF database (now superseded by the HWsecdb database).
For use in publications and presentations please cite this data collection as follows:
M. Alioto, “HW security primitives Green IC database,” [Online]. Available: https://www.green-ic.org/hwsecdb
(major overhaul of previous version: M. Alioto, S. Taneja, “HW security primitives Green IC database”)
For authors of new primitives for HW security and papers with experimental validation
Authors of new primitives who wish their silicon demonstrations to be included in the future revisions of this database can send an email to Prof. Alioto and attach the following pieces of information:
- reference of the publication presenting the primitive
- performance and numerical data based on the figures of merit used in the above spreadsheet.
Any comment/suggestion on how to improve this page and the spreadsheet is welcome.
Exploring further
As further sources of information, please refer to:
- our forum talk on HW security for intelligent sensing at ISSCC 2024 (“F4: Intelligent Sensing”)
- our invited overview paper: M. Alioto, “Aggressive Design Reuse for Ubiquitous Zero-Trust Edge Security – From Physical Design to Machine Learning-Based Hardware Patching,” IEEE Open Journal of the Solid-State Circuits Society (invited), vol. 3, pp. 1-16, 2023
- our forum on HW security at ISSCC 2022 (“F6: Computer Systems Under Attack – Paying the Performance Price for Protection”) with following speakers: Serge Leef (DARPA), Todd Austin (UMich), Carlos Rozas (Intel), Dongkyun Kim (SK hynix), Ruby Lee (Princeton), Ileana Buhan (Radboud University), Noriyuki Miura (Osaka University), Sujoy Sinha Roy (Graz University)
- our tutorial on HW security at ISSCC 2019 (see ISSCC materials, and soon through the media content offered by the IEEE Solid-State Circuits Society)
- our tutorial on entropy generation for ubiquitous security at ESSCIRC 2021
- our surveys on primitives for HW security
- M. Alioto, “Trends in Hardware Security: from Basics to ASICs,” IEEE Solid-State Circuits Magazine (invited), vol. 11, no. 3, pp. 56-74, Aug. 2019
- M. Alioto, S. Taneja, “Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems,” in Proc. of IEEE CICC 2019 (invited), Austin (USA), April 2019