An overview of DRAM-based security primitives

NA Anagnostopoulos, S Katzenbeisser, J Chandy… - Cryptography, 2018 - mdpi.com
Recent developments have increased the demand for adequate security solutions, based on
primitives that cannot be easily manipulated or altered, such as hardware-based primitives …

Intrinsic PUF instance on non-volatile NAND Flash memory

S Vasudeva, S Tehranipoor, N Karimian - arxiv preprint arxiv:2111.05459, 2021 - arxiv.org
Embedded systems or micro controller based modules have become increasingly prevalent
in our daily lives. However, the security of embedded devices as well as the authenticity of …

Towards implementation of robust and low-cost security primitives for resource-constrained iot devices

F Tehranipoor - arxiv preprint arxiv:1806.05332, 2018 - arxiv.org
In recent years, due to the trend in globalization, system integrators have had to deal with
integrated circuit (IC)/intellectual property (IP) counterfeiting more than ever. These …

DLA-PUF: deep learning attacks on hardware security primitives

A Pugazhenthi, N Karimian… - … , and Security for …, 2019 - spiedigitallibrary.org
Physical Unclonable Functions (PUFs) act as functions encoded in hardware, which
produce a unique output, being referred to as a response, for a specific input, being called a …

Attacks on Lightweight Hardware-Based Security Primitives

J Edmonds, F Tehranipoor - arxiv preprint arxiv:2011.13450, 2020 - arxiv.org
In today's digital age, the ease of data collection, transfer, and storage continue to shape
modern society and the ways we interact with our world. The advantages are numerous, but …