Physical unclonable functions and applications: A tutorial

C Herder, MD Yu, F Koushanfar… - Proceedings of the …, 2014 - ieeexplore.ieee.org
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …

A primer on hardware security: Models, methods, and metrics

M Rostami, F Koushanfar, R Karri - Proceedings of the IEEE, 2014 - ieeexplore.ieee.org
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …

Secret-free security: A survey and tutorial

U Rührmair - Journal of Cryptographic Engineering, 2022 - Springer
Abstract “Classical keys,” ie, secret keys stored permanently in digital form in nonvolatile
memory, appear indispensable in modern computer security—but also constitute an obvious …

SpyHammer: Using RowHammer to remotely spy on temperature

L Orosa, U Rührmair, AG Yağlikçi, H Luo… - …, 2022 - research-collection.ethz.ch
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row by just
accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate …

PUFatt: Embedded platform attestation based on novel processor-based PUFs

J Kong, F Koushanfar, PK Pendyala… - Proceedings of the 51st …, 2014 - dl.acm.org
Software-based attestation schemes aim at proving the integrity of code and data residing
on a platform to a verifying party. However, they do not bind the hardware characteristics to …

Hybrid side-channel/machine-learning attacks on PUFs: A new threat?

X Xu, W Burleson - 2014 Design, Automation & Test in Europe …, 2014 - ieeexplore.ieee.org
Machine Learning (ML) is a well-studied strategy in modeling Physical Unclonable
Functions (PUFs) but reaches its limits while applied on instances of high complexity. To …

Active and passive side-channel attacks on delay based PUF designs

GT Becker, R Kumar - Cryptology ePrint Archive, 2014 - eprint.iacr.org
Abstract Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to
traditional cryptography. The fact that no secret key needs to be stored in non-volatile …

A noise bifurcation architecture for linear additive physical functions

MD Yu, D M'Raïhi, I Verbauwhede… - … on Hardware-Oriented …, 2014 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on
its manufacturing variations using challenge/response evaluations. Popular realizations use …

Cybersecurity: Past, present and future

S Alam - arxiv preprint arxiv:2207.01227, 2022 - arxiv.org
The digital transformation has created a new digital space known as cyberspace. This new
cyberspace has improved the workings of businesses, organizations, governments, society …

An intelligent approach for virtual machine and QoS provisioning in cloud computing

AK Das, T Adhikary, MA Razzaque… - The International …, 2013 - ieeexplore.ieee.org
Cloud Computing has become the most popular distributed computing environment
because it does not require any user level management and controlling on the low-level …