Proceedings ArticleDOI
Physical unclonable functions for device authentication and secret key generation
G. Edward Suh,Srinivas Devadas +1 more
- pp 9-14
TLDR
This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.Abstract:
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.read more
Citations
More filters
Proceedings ArticleDOI
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
TL;DR: This paper exploits repeatability imperfections of PUF responses as a side channel for model building and demonstrates that 65nm CMOS arbiter PUFs can be modeled successfully, without utilizing any ML algorithm.
Proceedings ArticleDOI
Logic encryption: a fault analysis perspective
TL;DR: This work relates logic encryption to fault propagation analysis in IC testing and develop a fault analysis based logic encryption technique that achieves 50% Hamming distance between the correct and wrong outputs (ideal case) when a wrong key is applied.
Journal ArticleDOI
Attacks and Defenses for JTAG
Kurt Rosenfeld,Ramesh Karri +1 more
TL;DR: JTAG is a well-known standard mechanism for in-field test that provides high controllability and observability, but it also poses great security challenges.
Book ChapterDOI
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
Anthony Van Herrewege,Stefan Katzenbeisser,Roel Maes,Roel Peeters,Ahmad-Reza Sadeghi,Ingrid Verbauwhede,Christian Wachsmann +6 more
TL;DR: This paper presents a proof-of-concept implementation of a novel PUF-based authentication scheme for RFID that allows for mutual authentication of tickets and terminals and allows for a limited number of authentications.
Book ChapterDOI
Side-channel analysis of PUFs and fuzzy extractors
TL;DR: A proof-of-concept attack on an FPGA implementation of a fuzzy extractor shows that it is possible to extract the cryptographic key derived from a PUF by side-channel analysis.
References
More filters
Journal ArticleDOI
Physical one-way functions
TL;DR: The concept of fabrication complexity is introduced as a way of quantifying the difficulty of materially cloning physical systems with arbitrary internal states as primitives for physical analogs of cryptosystems.
Proceedings ArticleDOI
Silicon physical random functions
TL;DR: It is argued that a complex integrated circuit can be viewed as a silicon PUF and a technique to identify and authenticate individual integrated circuits (ICs) is described.
Tamper resistance: a cautionary note
Ross Anderson,Markus G. Kuhn +1 more
TL;DR: It is concluded that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable.
Journal ArticleDOI
Extracting secret keys from integrated circuits
TL;DR: It is shown that arbiter-based PUFs are realizable and well suited to build key-cards that need to be resistant to physical attacks and to be identified securely and reliably over a practical range of environmental variations such as temperature and power supply voltage.
Journal ArticleDOI
Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration
TL;DR: In this paper, a model describing the maximum clock frequency distribution of a microprocessor is derived and compared with wafer sort data for a recent 0.25-/spl mu/m microprocessor.