Secret-free security: A survey and tutorial
U Rührmair - Journal of Cryptographic Engineering, 2022 - Springer
Abstract “Classical keys,” ie, secret keys stored permanently in digital form in nonvolatile
memory, appear indispensable in modern computer security—but also constitute an obvious …
memory, appear indispensable in modern computer security—but also constitute an obvious …
Harnessing disorder for photonic device applications
For photonic devices, structural disorder and light scattering have long been considered
annoying and detrimental features that were best avoided or minimized. This review shows …
annoying and detrimental features that were best avoided or minimized. This review shows …
SpyHammer: Using RowHammer to remotely spy on temperature
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row by just
accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate …
accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate …
All-optical multilevel physical unclonable functions
Disordered photonic structures are promising for the realization of physical unclonable
functions—physical objects that can overcome the limitations of conventional digital security …
functions—physical objects that can overcome the limitations of conventional digital security …
Silicon photonic physical unclonable function
Physical unclonable functions (PUFs) serve as a hardware source of private information that
cannot be duplicated and have applications in hardware integrity and information security …
cannot be duplicated and have applications in hardware integrity and information security …
Continuous-variable quantum authentication of physical unclonable keys
GM Nikolopoulos, E Diamanti - Scientific reports, 2017 - nature.com
We propose a scheme for authentication of physical keys that are materialized by optical
multiple-scattering media. The authentication relies on the optical response of the key when …
multiple-scattering media. The authentication relies on the optical response of the key when …
Sok: Towards secret-free security
U Ruhrmair - Proceedings of the 4th ACM Workshop on Attacks and …, 2020 - dl.acm.org
Digital secret keys are indispensable in modern cryptography and computer security-but at
the same time constitute a routinely exploited attack target in every hardware system that …
the same time constitute a routinely exploited attack target in every hardware system that …
Secure communications using nonlinear silicon photonic keys
We present a secure communication system constructed using pairs of nonlinear photonic
physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro …
physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro …
SpyHammer: Understanding and Exploiting RowHammer under Fine-Grained Temperature Variations
L Orosa, U Rührmair, AG Yagӏıkçı, H Luo… - IEEE …, 2024 - ieeexplore.ieee.org
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row solely
by accessing its neighboring DRAM rows at a high-enough rate. Recent studies …
by accessing its neighboring DRAM rows at a high-enough rate. Recent studies …
Physical realization of a hyper unclonable function
Disordered photonic structures are promising materials for the realization of physical
unclonable functions (PUF), physical objects that can overcome the limitations of …
unclonable functions (PUF), physical objects that can overcome the limitations of …