Physical unclonable functions and applications: A tutorial
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …
authentication and key generation applications. First, it motivates the use of PUFs versus …
A primer on hardware security: Models, methods, and metrics
The multinational, distributed, and multistep nature of integrated circuit (IC) production
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware …
Secret-free security: A survey and tutorial
U Rührmair - Journal of Cryptographic Engineering, 2022 - Springer
Abstract “Classical keys,” ie, secret keys stored permanently in digital form in nonvolatile
memory, appear indispensable in modern computer security—but also constitute an obvious …
memory, appear indispensable in modern computer security—but also constitute an obvious …
SpyHammer: Using RowHammer to remotely spy on temperature
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row by just
accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate …
accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate …
PUFatt: Embedded platform attestation based on novel processor-based PUFs
Software-based attestation schemes aim at proving the integrity of code and data residing
on a platform to a verifying party. However, they do not bind the hardware characteristics to …
on a platform to a verifying party. However, they do not bind the hardware characteristics to …
Hybrid side-channel/machine-learning attacks on PUFs: A new threat?
Machine Learning (ML) is a well-studied strategy in modeling Physical Unclonable
Functions (PUFs) but reaches its limits while applied on instances of high complexity. To …
Functions (PUFs) but reaches its limits while applied on instances of high complexity. To …
Active and passive side-channel attacks on delay based PUF designs
Abstract Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to
traditional cryptography. The fact that no secret key needs to be stored in non-volatile …
traditional cryptography. The fact that no secret key needs to be stored in non-volatile …
A noise bifurcation architecture for linear additive physical functions
Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on
its manufacturing variations using challenge/response evaluations. Popular realizations use …
its manufacturing variations using challenge/response evaluations. Popular realizations use …
Cybersecurity: Past, present and future
S Alam - arxiv preprint arxiv:2207.01227, 2022 - arxiv.org
The digital transformation has created a new digital space known as cyberspace. This new
cyberspace has improved the workings of businesses, organizations, governments, society …
cyberspace has improved the workings of businesses, organizations, governments, society …
An intelligent approach for virtual machine and QoS provisioning in cloud computing
Cloud Computing has become the most popular distributed computing environment
because it does not require any user level management and controlling on the low-level …
because it does not require any user level management and controlling on the low-level …