Physical unclonable functions in the internet of things: State of the art and open challenges
Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …
Physical unclonable functions (PUF) for IoT devices
A Al-Meer, S Al-Kuwari - ACM Computing Surveys, 2023 - dl.acm.org
Physical Unclonable Function (PUF) has recently attracted interest from both industry and
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …
The gap between promise and reality: On the insecurity of XOR arbiter PUFs
GT Becker - … Hardware and Embedded Systems--CHES 2015: 17th …, 2015 - Springer
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and
stable, and which possesses a rigorous security argument, has been a fundamental problem …
stable, and which possesses a rigorous security argument, has been a fundamental problem …
A lockdown technique to prevent machine learning on PUFs for lightweight authentication
We present a lightweight PUF-based authentication approach that is practical in settings
where a server authenticates a device, and for use cases where the number of …
where a server authenticates a device, and for use cases where the number of …
A survey on lightweight entity authentication with strong PUFs
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …
Emerging physical unclonable functions with nanotechnology
Physical unclonable functions (PUFs) are increasingly used for authentication and
identification applications as well as the cryptographic key generation. An important feature …
identification applications as well as the cryptographic key generation. An important feature …
A multiplexer-based arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Arbiter Physically Unclonable Functions (APUFs), while being relatively lightweight, are
extremely vulnerable to modeling attacks. Hence, various compositions of APUFs such as …
extremely vulnerable to modeling attacks. Hence, various compositions of APUFs such as …
Homogeneous and heterogeneous feed-forward XOR physical unclonable functions
Physical unclonable functions (PUFs) are hardware security primitives that are used for
device authentication and cryptographic key generation. Standard XOR PUFs typically …
device authentication and cryptographic key generation. Standard XOR PUFs typically …
Neural network modeling attacks on arbiter-PUF-based designs
By revisiting, improving, and extending recent neural-network based modeling attacks on
XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs,(XOR) Feed-Forward …
XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs,(XOR) Feed-Forward …