Physical unclonable functions
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
A puf taxonomy
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …
during communications. For security, it is important that these identities are complex, in order …
PUF modeling attacks on simulated and silicon data
We discuss numerical modeling attacks on several proposed strong physical unclonable
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
[BOOK][B] Physically unclonable functions: Concept and constructions
R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …
or PUF. Many research results on this topic were published over recent years in a variety of …
The gap between promise and reality: On the insecurity of XOR arbiter PUFs
GT Becker - … Hardware and Embedded Systems--CHES 2015: 17th …, 2015 - Springer
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and
stable, and which possesses a rigorous security argument, has been a fundamental problem …
stable, and which possesses a rigorous security argument, has been a fundamental problem …
A PUF-based secure communication protocol for IoT
Security features are of paramount importance for the Internet of Things (IoT), and
implementations are challenging given the resource-constrained IoT setup. We have …
implementations are challenging given the resource-constrained IoT setup. We have …
Splitting the interpose PUF: A novel modeling attack strategy
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …
A retrospective and a look forward: Fifteen years of physical unclonable function advancement
Severe security threats and alerts associated with the use of smart devices have drawn
increasing public attentions since the inception of Internet of Things (IoT) in late 1990s. IoT …
increasing public attentions since the inception of Internet of Things (IoT) in late 1990s. IoT …