FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …
been proposed as central building blocks in many cryptographic protocols and security …
A comprehensive survey on hardware-assisted malware analysis and primitive techniques
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …
various domains such as smart cities, intelligent transportation, wireless sensor networks …
QUAC-TRNG: High-throughput true random number generation using quadruple row activation in commodity DRAM chips
True random number generators (TRNG) sample random physical processes to create large
amounts of random numbers for various use cases, including security-critical cryptographic …
amounts of random numbers for various use cases, including security-critical cryptographic …
D-RaNGe: Using commodity DRAM devices to generate true random numbers with low latency and high throughput
We propose a new DRAM-based true random number generator (TRNG) that leverages
DRAM cells as an entropy source. The key idea is to intentionally violate the DRAM access …
DRAM cells as an entropy source. The key idea is to intentionally violate the DRAM access …
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS
With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for
smart embedded devices is rapidly increasing, and so does the security and privacy risk …
smart embedded devices is rapidly increasing, and so does the security and privacy risk …
Providing root of trust for ARM TrustZone using on-chip SRAM
We present the design, implementation and evaluation of the root of trust for the Trusted
Execution Environment (TEE) provided by ARM TrustZone based on the on-chip SRAM …
Execution Environment (TEE) provided by ARM TrustZone based on the on-chip SRAM …
Cryptographie key generation from PUF data using efficient fuzzy extractors
H Kang, Y Hori, T Katashita… - 16th International …, 2014 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) and biometrics are inherently noisy. When used in
practice as cryptographic key generators, they need to be combined with an extraction …
practice as cryptographic key generators, they need to be combined with an extraction …
DR-STRaNGe: end-to-end system design for DRAM-based true random number generators
Random number generation is an important task in a wide variety of critical applications
including cryptographic algorithms, scientific simulations, and industrial testing tools. True …
including cryptographic algorithms, scientific simulations, and industrial testing tools. True …
Puf-phenotype: A robust and noise-resilient approach to aid group-based authentication with dram-pufs using machine learning
As the demand for highly secure and dependable lightweight systems increases in the
modern world, Physically Unclonable Functions (PUFs) continue to promise a lightweight …
modern world, Physically Unclonable Functions (PUFs) continue to promise a lightweight …
A random encoding method for secure data communication: an extension of sequential coding
The security of data communication is very important in all aspects. V. Shukla et al. had
proposed a secure sequential coding method. They have shown the results for text secret …
proposed a secure sequential coding method. They have shown the results for text secret …