Physically unclonable functions: A study on the state of the art and future research directions

R Maes, I Verbauwhede - Towards Hardware-Intrinsic Security …, 2010 - Springer
The idea of using intrinsic random physical features to identify objects, systems, and people
is not new. Fingerprint identification of humans dates at least back to the nineteenth century …

Arbiter puf—a review of design, composition, and security aspects

S Hemavathy, VSK Bhaaskaran - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security modules play a crucial role in protecting and preserving technologically
integrated systems that are used in daily life. They employ cryptographic protocols to secure …

A puf taxonomy

T McGrath, IE Bagci, ZM Wang, U Roedig… - Applied physics …, 2019 - pubs.aip.org
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …

On improving the security of logic locking

M Yasin, JJV Rajendran, O Sinanoglu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain
can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by …

PUF modeling attacks on simulated and silicon data

U Rührmair, J Sölter, F Sehnke, X Xu… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
We discuss numerical modeling attacks on several proposed strong physical unclonable
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …

[BUCH][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

A survey of hardware trojan taxonomy and detection

M Tehranipoor, F Koushanfar - IEEE design & test of computers, 2010 - ieeexplore.ieee.org
A Survey of Hardware Trojan Taxonomy and Detection Page 1 A Survey of Hardware Trojan
Taxonomy and Detection Mohammad Tehranipoor University of Connecticut Farinaz …

The DRAM latency PUF: Quickly evaluating physical unclonable functions by exploiting the latency-reliability tradeoff in modern commodity DRAM devices

JS Kim, M Patel, H Hassan… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are commonly used in cryptography to identify
devices based on the uniqueness of their physical microstructures. DRAM-based PUFs have …

The bistable ring PUF: A new architecture for strong physical unclonable functions

Q Chen, G Csaba, P Lugli… - … Security and Trust, 2011 - ieeexplore.ieee.org
This paper introduces a new architecture for circuit-based Physical Unclonable Functions
(PUFs) which we call the Bistable Ring PUF (BR-PUF). Based on experimental results …

PUFs at a glance

U Rührmair, DE Holcomb - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which
has been introduced just about a decade ago. In this paper, we provide a brief and easily …