A survey on silicon PUFs and recent advances in ring oscillator PUFs

JL Zhang, G Qu, YQ Lv, Q Zhou - Journal of computer science and …, 2014 - Springer
Silicon physical unclonable function (PUF) is a popular hardware security primitive that
exploits the intrinsic variation of IC manufacturing process to generate chip-unique …

CaPUF: Cascaded PUF structure for machine learning resiliency

H Nassar, L Bauer, J Henkel - IEEE Transactions on Computer …, 2022 - ieeexplore.ieee.org
With the rise of the Internet of Things (IoT), resource-constrained and power-constrained
devices attract more attention. The need for lightweight solutions as alternatives to resource …

CNPUF: A carbon nanotube-based physically unclonable function for secure low-energy hardware design

STC Konigsmark, LK Hwang, D Chen… - 2014 19th Asia and …, 2014 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are used to provide identification, authentication
and secret key generation based on unique and unpredictable physical characteristics …

Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes

M Hiller, M Weiner, L Rodrigues Lima… - Proceedings of the 3rd …, 2013 - dl.acm.org
Secret key generation with Physical Unclonable Functions (PUFs) is an alternative to
conventional secure key storage with non-volatile memory. In a PUF, secret bits are …

A survey of identity modeling and identity addressing in Internet of Things

H Ning, Z Zhen, F Shi… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of the Internet of Things (IoT), the physical space we are living in is
experiencing unprecedented digitalization and virtualization. It is an overwhelming trend to …

[HTML][HTML] Investigation of the optimal method for generating and verifying the smartphone's fingerprint: a review

SJ Alsunaidi, AM Almuhaideb - Journal of King Saud University-Computer …, 2022 - Elsevier
The technical transformation and transfer of most services to digital platforms require that
everyone has an electronic device connected to the Internet to assist them accomplish their …

Study on PUF based secure protection for IC design

W Liang, B Liao, J Long, Y Jiang, L Peng - Microprocessors and …, 2016 - Elsevier
The rapid progress in integrated circuit (IC) technology makes the gates in a single chip
increase by Moore's law. The complexity in design and verification grows accordingly. To …

PUF-based software protection for low-end embedded devices

F Kohnhäuser, A Schaller, S Katzenbeisser - Trust and Trustworthy …, 2015 - Springer
In recent years, low-end embedded devices have been used increasingly in various
scenarios, ranging from consumer electronics to industrial equipment. However, this …

Defense against chip cloning attacks based on fractional Hopfield neural networks

YF Pu, Z Yi, JL Zhou - International Journal of Neural Systems, 2017 - World Scientific
This paper presents a state-of-the-art application of fractional hopfield neural networks
(FHNNs) to defend against chip cloning attacks, and provides insight into the reason that the …

Physical unclonable functions based on carbon nanotube FETs

M Moradi, S Tao, RF Mirzaee - 2017 IEEE 47th International …, 2017 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are new hardware security primitives proposed for
protecting resource-constrained devices. This paper presents two PUFs in voltage-and …