Hardware designs for security in ultra-low-power IoT systems: An overview and survey

K Yang, D Blaauw, D Sylvester - IEEE Micro, 2017 - ieeexplore.ieee.org
The development of ultra-low-power (ULP) electronic devices has opened up opportunities
for disruptive systems like the Internet of Things (IoT). The main concern is the security and …

The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks

PH Nguyen, DP Sahoo, C **, K Mahmood… - Cryptology ePrint …, 2018 - eprint.iacr.org
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and
stable, and which possesses a rigorous security argument, has been a fundamental problem …

A lockdown technique to prevent machine learning on PUFs for lightweight authentication

MD Yu, M Hiller, J Delvaux, R Sowell… - … on Multi-Scale …, 2016 - ieeexplore.ieee.org
We present a lightweight PUF-based authentication approach that is practical in settings
where a server authenticates a device, and for use cases where the number of …

Deep learning based model building attacks on arbiter PUF compositions

P Santikellur, A Bhattacharyay… - Cryptology ePrint …, 2019 - eprint.iacr.org
Robustness to modeling attacks is an important requirement for PUF circuits. Several
reported Arbiter PUF com-positions have resisted modeling attacks. and often require huge …

Splitting the interpose PUF: A novel modeling attack strategy

N Wisiol, C Mühl, N Pirnay, PH Nguyen… - IACR Transactions on …, 2020 - tosc.iacr.org
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …

A double PUF-based RFID identity authentication protocol in service-centric internet of things environments

W Liang, S **e, J Long, KC Li, D Zhang, K Li - Information Sciences, 2019 - Elsevier
The rapid development of sensing, automation and communication technologies has led to
the proliferation of the Internet of Things (IoT), providing recognized promising opportunities …

Homogeneous and heterogeneous feed-forward XOR physical unclonable functions

SVS Avvaru, Z Zeng, KK Parhi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are hardware security primitives that are used for
device authentication and cryptographic key generation. Standard XOR PUFs typically …

A lightweight puf-based authentication protocol using secret pattern recognition for constrained iot devices

TA Idriss, HA Idriss, MA Bayoumi - IEEE Access, 2021 - ieeexplore.ieee.org
PUFs, or physical unclonable functions, are hardware security primitives that can offer
lightweight security solutions for constrained devices through challenge-response …

Laser fault attack on physically unclonable functions

S Tajik, H Lohrke, F Ganji, JP Seifert… - 2015 workshop on fault …, 2015 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are introduced to remedy the shortcomings of
traditional methods of secure key storage and random key generation on Integrated Circuits …

Machine learning for hardware security: Opportunities and risks

R Elnaggar, K Chakrabarty - Journal of Electronic Testing, 2018 - Springer
Recently, machine learning algorithms have been utilized by system defenders and
attackers to secure and attack hardware, respectively. In this work, we investigate the impact …