Physical unclonable functions for device authentication and secret key generation

GE Suh, S Devadas - Proceedings of the 44th annual design automation …, 2007‏ - dl.acm.org
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …

Statistical timing analysis: From basic principles to state of the art

D Blaauw, K Chopra, A Srivastava… - IEEE transactions on …, 2008‏ - ieeexplore.ieee.org
Static-timing analysis (STA) has been one of the most pervasive and successful analysis
engines in the design of digital circuits for the last 20 years. However, in recent years, the …

Statistical static timing analysis: A survey

C Forzan, D Pandini - Integration, 2009‏ - Elsevier
As the device and interconnect physical dimensions decrease steadily in modern nanometer
silicon technologies, the ability to control the process and environmental variations is …

Understanding the effect of process variations on the delay of static and domino logic

M Alioto, G Palumbo, M Pennisi - IEEE Transactions on Very …, 2009‏ - ieeexplore.ieee.org
In this paper, the effect of process variations on delay is analyzed in depth for both static and
dynamic CMOS logic styles. Analysis allows for gaining an insight into the delay …

Clock around the clock: Time-based device fingerprinting

I Sanchez-Rola, I Santos, D Balzarotti - Proceedings of the 2018 ACM …, 2018‏ - dl.acm.org
Physical device fingerprinting exploits hardware features to uniquely identify a machine.
This technique has been used for authentication, license binding, or attackers identification …

Flash memory for ubiquitous hardware security functions: True random number generation and device fingerprints

Y Wang, W Yu, S Wu, G Malysa… - … IEEE Symposium on …, 2012‏ - ieeexplore.ieee.org
We demonstrate that unmodified commercial Flash memory can provide two important
security functions: true random number generation and digital fingerprinting. Taking …

Lessons learned: Analysis of PUF-based authentication protocols for IoT

K Lounis, M Zulkernine - Digital threats: research and practice, 2023‏ - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …

Power, thermal, and reliability modeling in nanometer-scale microprocessors

D Brooks, RP Dick, R Joseph, L Shang - Ieee Micro, 2007‏ - ieeexplore.ieee.org
System integration and performance requirements are dramatically increasing the power
consumptions and power densities of high-performance microprocessors. High power …

AEGIS: A single-chip secure processor

GE Suh, CW O'Donnell, S Devadas - Information Security Technical Report, 2005‏ - Elsevier
This article presents the AEGIS secure processor architecture, which enables new
applications by ensuring private and authentic program execution even in the face of …

Leakage power analysis attacks: A novel class of attacks to nanometer cryptographic circuits

M Alioto, L Giancane, G Scotti… - IEEE Transactions on …, 2009‏ - ieeexplore.ieee.org
In this paper, a novel class of power analysis attacks to cryptographic circuits is presented.
These attacks aim at recovering the secret key of a cryptographic core from measurements …