Physical unclonable functions in the internet of things: State of the art and open challenges
Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …
FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …
been proposed as central building blocks in many cryptographic protocols and security …
Emerging physical unclonable functions with nanotechnology
Physical unclonable functions (PUFs) are increasingly used for authentication and
identification applications as well as the cryptographic key generation. An important feature …
identification applications as well as the cryptographic key generation. An important feature …
On the power of optical contactless probing: Attacking bitstream encryption of FPGAs
Modern Integrated Circuits (ICs) employ several classes of countermeasures to mitigate
physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless …
physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless …
PUFs at a glance
U Rührmair, DE Holcomb - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which
has been introduced just about a decade ago. In this paper, we provide a brief and easily …
has been introduced just about a decade ago. In this paper, we provide a brief and easily …
Efficient power and timing side channels for physical unclonable functions
One part of the original PUF promise was their improved resilience against physical attack
methods, such as cloning, invasive techniques, and arguably also side channels. In recent …
methods, such as cloning, invasive techniques, and arguably also side channels. In recent …
Key extraction using thermal laser stimulation: A case study on xilinx ultrascale fpgas
Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an
adversary to localize and read out stored secrets in the SRAM of a chip. To this date, a few …
adversary to localize and read out stored secrets in the SRAM of a chip. To this date, a few …
Combined modeling and side channel attacks on strong PUFs
Abstract Physical Unclonable Functions (PUFs) have established themselves in the scientific
literature, and are also gaining ground in commercial applications. Recently, however …
literature, and are also gaining ground in commercial applications. Recently, however …
Trends in hardware security: From basics to ASICs
M Alioto - IEEE Solid-State Circuits Magazine, 2019 - ieeexplore.ieee.org
This article presents an excerpt of the tutorial on hardware security delivered at the 2019
IEEE International Solid-State Circuits Conference and an introduction to a performance …
IEEE International Solid-State Circuits Conference and an introduction to a performance …
End-to-end design of a PUF-based privacy preserving authentication protocol
A Aysu, E Gulcan, D Moriyama, P Schaumont… - … and Embedded Systems …, 2015 - Springer
We demonstrate a prototype implementation of a provably secure protocol that supports
privacy-preserving mutual authentication between a server and a constrained device. Our …
privacy-preserving mutual authentication between a server and a constrained device. Our …