Physical unclonable functions

Y Gao, SF Al-Sarawi, D Abbott - Nature Electronics, 2020 - nature.com
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …

Physical unclonable functions in the internet of things: State of the art and open challenges

A Babaei, G Schiele - Sensors, 2019 - mdpi.com
Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …

The gap between promise and reality: On the insecurity of XOR arbiter PUFs

GT Becker - … Hardware and Embedded Systems--CHES 2015: 17th …, 2015 - Springer
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …

The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks

PH Nguyen, DP Sahoo, C **, K Mahmood… - Cryptology ePrint …, 2018 - eprint.iacr.org
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and
stable, and which possesses a rigorous security argument, has been a fundamental problem …

Approximation attacks on strong PUFs

J Shi, Y Lu, J Zhang - … transactions on computer-aided design of …, 2019 - ieeexplore.ieee.org
Physical unclonable function (PUF) is a promising lightweight hardware security primitive for
resource-constrained systems. It can generate a large number of challenge-response pairs …

A lockdown technique to prevent machine learning on PUFs for lightweight authentication

MD Yu, M Hiller, J Delvaux, R Sowell… - … on Multi-Scale …, 2016 - ieeexplore.ieee.org
We present a lightweight PUF-based authentication approach that is practical in settings
where a server authenticates a device, and for use cases where the number of …

A survey on lightweight entity authentication with strong PUFs

J Delvaux, R Peeters, D Gu… - ACM Computing Surveys …, 2015 - dl.acm.org
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …

Deep learning based model building attacks on arbiter PUF compositions

P Santikellur, A Bhattacharyay… - Cryptology ePrint …, 2019 - eprint.iacr.org
Robustness to modeling attacks is an important requirement for PUF circuits. Several
reported Arbiter PUF com-positions have resisted modeling attacks. and often require huge …

{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies

M Guri, A Kachlon, O Hasson, G Kedma… - 24th USENIX Security …, 2015 - usenix.org
Air-gapped networks are isolated, separated both logically and physically from public
networks. Although the feasibility of invading such systems has been demonstrated in recent …

Splitting the interpose PUF: A novel modeling attack strategy

N Wisiol, C Mühl, N Pirnay, PH Nguyen… - IACR Transactions on …, 2020 - tches.iacr.org
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …