Physical Unclonable Functions and Applications: A Tutorial
Charles Herder,Meng-Day (Mandel) Yu,Farinaz Koushanfar,Srinivas Devadas +3 more
- Vol. 102, Iss: 8, pp 1126-1141
Reads0
Chats0
TLDR
This paper motivates the use of PUFs versus conventional secure nonvolatile memories, defines the two primary PUF types, and describes strong and weak PUF implementations and their use for low-cost authentication and key generation applications.Abstract:
This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional secure nonvolatile memories and defines the two primary PUF types: “strong PUFs” and “weak PUFs.” It describes strong PUF implementations and their use for low-cost authentication. After this description, the paper covers both attacks and protocols to address errors. Next, the paper covers weak PUF implementations and their use in key generation applications. It covers error-correction schemes such as pattern matching and index-based coding. Finally, this paper reviews several emerging concepts in PUF technologies such as public model PUFs and new PUF implementation technologies.read more
Citations
More filters
Journal ArticleDOI
In-memory computing with resistive switching devices
TL;DR: This Review Article examines the development of in-memory computing using resistive switching devices, where the two-terminal structure of the devices, theirresistive switching properties, and direct data processing in the memory can enable area- and energy-efficient computation.
Journal ArticleDOI
A review of emerging non-volatile memory (NVM) technologies and applications
TL;DR: High-performance and low-cost emerging NVMs may simplify memory hierarchy, introduce non-volatility in logic gates and circuits, reduce system power, and enable novel architectures, and Storage-class memory (SCM) based on high-density NVMs could fill the performance and density gap between memory and storage.
Journal ArticleDOI
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
TL;DR: A reasoned comparison of the considered IoT technologies with respect to a set of qualifying security attributes, namely integrity, anonymity, confidentiality, privacy, access control, authentication, authorization, resilience, self organization is concluded.
Journal ArticleDOI
Physical unclonable functions generated through chemical methods for anti-counterfeiting
TL;DR: Stochastic chemical processes can afford unique anti-counterfeiting tags that cannot be reproduced, which forms PUF keys that provide unbreakable encryption and combat counterfeiting.
Journal ArticleDOI
Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication.
Yang Liu,Fei Han,Fushan Li,Yan Zhao,Chen Maosheng,Zhongwei Xu,Xin Zheng,Hailong Hu,Jianmin Yao,Tailiang Guo,Wanzhen Lin,Yuanhui Zheng,Baogui You,Pai Liu,Yang Li,Lei Qian +15 more
TL;DR: A non-destructive, inkjet-printable, artificial intelligence (AI)-decodable and unclonable security label based on random patterning of quantum dot inks is developed, and accompanied with an artificial intelligence decoding mechanism capable of authenticating the patterns.
References
More filters
Proceedings ArticleDOI
Physical unclonable functions for device authentication and secret key generation
G. Edward Suh,Srinivas Devadas +1 more
TL;DR: This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.
Proceedings Article
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Book ChapterDOI
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Journal ArticleDOI
Physical one-way functions
TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Proceedings ArticleDOI
Silicon physical random functions
TL;DR: It is argued that a complex integrated circuit can be viewed as a silicon PUF and a technique to identify and authenticate individual integrated circuits (ICs) is described.