Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Spatial correlation in weak physical unclonable functions: A comprehensive overview
Physical Unclonable Functions (PUFs) are increasingly used in the process of securing
applications. For this purpose, it is crucial that the PUF satisfies all the required properties …
applications. For this purpose, it is crucial that the PUF satisfies all the required properties …
Modern Hardware Security: A Review of Attacks and Countermeasures
J Mishra, SK Sahay - arxiv preprint arxiv:2501.04394, 2025 - arxiv.org
With the exponential rise in the use of cloud services, smart devices, and IoT devices,
advanced cyber attacks have become increasingly sophisticated and ubiquitous …
advanced cyber attacks have become increasingly sophisticated and ubiquitous …
Memory-based PUFs are vulnerable as well: A non-invasive attack against SRAM PUFs
Memory-based physical unclonable functions (mPUFs) are widely accepted as highly
secure because of the unclonable and immutable nature of manufacturer process variations …
secure because of the unclonable and immutable nature of manufacturer process variations …
Employing blockchain and physical unclonable functions for counterfeit IoT devices detection
Counterfeit copycat devices have become one of the most important problems in IoT
ecosystem. The number of IoT devices manufactured has grown exponentially through last …
ecosystem. The number of IoT devices manufactured has grown exponentially through last …
Low-cost security for next-generation IoT networks
In recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well as the
pervasive character of next-generation communication protocols, such as the 5G …
pervasive character of next-generation communication protocols, such as the 5G …
Using implicit certification to efficiently establish authenticated group keys for in-vehicle networks
In the last years, researchers have exposed vulnerabilities on modern road vehicles that
may have severe safety implications. Specifically, the most popular in-vehicle …
may have severe safety implications. Specifically, the most popular in-vehicle …
SRAM has no chill: exploiting power domain separation to steal on-chip secrets
The abundance of embedded systems and smart devices increases the risk of physical
memory disclosure attacks. One such classic non-invasive attack exploits dynamic RAM's …
memory disclosure attacks. One such classic non-invasive attack exploits dynamic RAM's …
Error reduction of SRAM-based physically unclonable function for chip authentication
SRAM-based physically unclonable function (PUF) is an attractive security primitive for
cryptographic protocol and security architecture because SRAM itself is one of the most …
cryptographic protocol and security architecture because SRAM itself is one of the most …
A survey of security attacks on silicon based weak PUF architectures
C Yehoshuva, R Raja Adhithan… - Security in Computing …, 2021 - Springer
Abstract Physically Unclonable Functions (PUFs) are popular hardware-based security
primitives that can derive chip signatures from the inherent characteristics of ICs. Due to their …
primitives that can derive chip signatures from the inherent characteristics of ICs. Due to their …
Improving the reliability of SRAM-based PUFs under varying operation conditions and aging degradation
P Saraza-Canflanca, H Carrasco-Lopez… - Microelectronics …, 2021 - Elsevier
The utilization of power-up values in SRAM cells to generate PUF responses for chip
identification is a subject of intense study. The cells used for this purpose must be stable, ie …
identification is a subject of intense study. The cells used for this purpose must be stable, ie …