Cyber-Physical Systems Security 2018
DOI: 10.1007/978-3-319-98935-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Approximate Computing and Its Application to Hardware Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
4

Relationship

4
6

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…Furthermore, new approximate computing applications will be exploited. For instance, approximate computing can also provide new approaches for hardware security and implementation of cryptocurrency mining and lattice-based postquantum cryptography [22]. It is believed that more applications will utilize approximate computing due to power limitations.…”
Section: Reliability and Securitymentioning
confidence: 99%
“…Furthermore, new approximate computing applications will be exploited. For instance, approximate computing can also provide new approaches for hardware security and implementation of cryptocurrency mining and lattice-based postquantum cryptography [22]. It is believed that more applications will utilize approximate computing due to power limitations.…”
Section: Reliability and Securitymentioning
confidence: 99%
“…Most of the current research investigations focus on using approximate computing (e.g., approximate circuits) to improve performance with an acceptable loss of accuracy. Although approximate computing designs save power and area, security vulnerabilities have been reported [2], [7], [8], [9] due to the uncertainty and unpredictability of the intrinsic errors during an approximate computational execution. [2] has provided a comprehensive classification of the works on this topic, including the challenges and opportunities in approximate computing.…”
Section: Security Vulnerabilities In Approximate Circuitsmentioning
confidence: 99%
“…In the exclusive logic-based attack detection module [79], the outputs of the approximate function are selectively examined to generate an alert signal to indicate hardware attacks on AC IPs. The works [37,74] considers the approximate technique that truncate certain LSBs in a data for power saving and proposes to embed security bits in the truncated data to detect errors. Reference [78] protects AC systems by blurring the boundary between AC and non-AC zones such that the obfuscated boundary can mislead attackers and thus improve the success rate of attack detection.…”
Section: Examples Of Runtime Detectionmentioning
confidence: 99%