Challenges and opportunities in analog and mixed signal (AMS) integrated circuit (IC) security

MM Alam, S Chowdhury, B Park, D Munzer… - Journal of Hardware and …, 2018 - Springer
In the last decade and so, a large amount of research has been done to secure hardware.
Security features such as physically unclonable function (PUF), hardware metering, and …

IoT-ID: A novel device-specific identifier based on unique hardware fingerprints

G Vaidya, A Nambi, TV Prabhakar… - 2020 IEEE/ACM Fifth …, 2020 - ieeexplore.ieee.org
A significant number of IoT devices are being deployed in the wild, mostly in remote
locations and in untrusted conditions. This could include monitoring an electronic perimeter …

GPIO PUF for IoT devices

G Vaidya, TV Prabhakar… - GLOBECOM 2020-2020 …, 2020 - ieeexplore.ieee.org
As the number of IoT devices start to explode, establishing the irrefutable device identity is at
the root of trust. Physically Unclonable Functions (PUFs) are emerging as a significant …

Repurposing SoC analog circuitry for additional COTS hardware security

A Duncan, L Jiang, M Swany - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
This paper introduces a new methodology to generate additional hardware security in
commercial off-the-shelf (COTS) system-on-a-chip (SoC) integrated circuits (ICs) that have …

A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications

T Bryant, S Chowdhury, D Forte… - … Security and Trust …, 2017 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are a promising security technique which utilize the
random process variation in silicon fabrication in order to create unique identifiers and other …

Generating hash value at edge device using SRAM-PUF and autoencoder in IoT network

A Anand, JP Singh - Proceedings of the Indian National Science Academy, 2024 - Springer
With the deployment of the Internet of Things (IoT) networks, numerous IoT devices are
placed in remote and often untrusted locations, such as open or wild environments. The …

Towards generating a reliable device-specific identifier for IoT devices

G Vaidya, A Nambi, TV Prabhakar… - Pervasive and Mobile …, 2021 - Elsevier
A significant number of IoT devices are being deployed in the wild, mostly in remote
locations and in untrusted conditions. This could include monitoring an electronic perimeter …

A Comprehensive Analysis of the Environmental Impact on ROPUFs employed in Hardware Security, and Techniques for Trojan Detection

FN Alsulami - 2022 - search.proquest.com
Ever-increasing hardware fabrication costs have compelled the semiconductor industry to
utilize the global supply chain by shifting integrated circuit manufacturing overseas. This …

Extracting weak PUFs from differential nonlinearity of digital-to-analog converters

A Herkle, H Mandry, S Reich, M Sporer… - … on Circuits and …, 2020 - ieeexplore.ieee.org
Physical Unclonable Functions utilize random variations from manufacturing to generate
unpredictable, yet repeat-able fingerprints of devices for usage in a hardware cryptographic …

Sensor Identification via Acoustic Physically Unclonable Function

G Vaidya, TV Prabhakar, N Gnani, R Shah… - … Threats: Research and …, 2023 - dl.acm.org
The traceability of components on a supply chain from a production facility to deployment
and maintenance depends upon its irrefutable identity. There are two well-known …