Physical unclonable functions
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
Physical unclonable functions in the internet of things: State of the art and open challenges
Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …
The gap between promise and reality: On the insecurity of XOR arbiter PUFs
GT Becker - … Hardware and Embedded Systems--CHES 2015: 17th …, 2015 - Springer
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and
stable, and which possesses a rigorous security argument, has been a fundamental problem …
stable, and which possesses a rigorous security argument, has been a fundamental problem …
Approximation attacks on strong PUFs
J Shi, Y Lu, J Zhang - … transactions on computer-aided design of …, 2019 - ieeexplore.ieee.org
Physical unclonable function (PUF) is a promising lightweight hardware security primitive for
resource-constrained systems. It can generate a large number of challenge-response pairs …
resource-constrained systems. It can generate a large number of challenge-response pairs …
A lockdown technique to prevent machine learning on PUFs for lightweight authentication
We present a lightweight PUF-based authentication approach that is practical in settings
where a server authenticates a device, and for use cases where the number of …
where a server authenticates a device, and for use cases where the number of …
A survey on lightweight entity authentication with strong PUFs
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …
Deep learning based model building attacks on arbiter PUF compositions
Robustness to modeling attacks is an important requirement for PUF circuits. Several
reported Arbiter PUF com-positions have resisted modeling attacks. and often require huge …
reported Arbiter PUF com-positions have resisted modeling attacks. and often require huge …
{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies
M Guri, A Kachlon, O Hasson, G Kedma… - 24th USENIX Security …, 2015 - usenix.org
Air-gapped networks are isolated, separated both logically and physically from public
networks. Although the feasibility of invading such systems has been demonstrated in recent …
networks. Although the feasibility of invading such systems has been demonstrated in recent …
Splitting the interpose PUF: A novel modeling attack strategy
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …