The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2012 vol.10)
pp: 80-83
Helena Handschuh , Katholieke Universiteit Leuven
ABSTRACT
Physical unclonable functions (PUFs) originate in intrinsic properties extracted from devices and objects for the purpose of identification. A special type of silicon PUFs called SRAM (static RAM) PUFs can help make integrated circuits securer.
INDEX TERMS
computer security, physical unclonable functions, PUFs, SRAM, ICs
CITATION
Helena Handschuh, "Hardware-Anchored Security Based on SRAM PUFs, Part 1", IEEE Security & Privacy, vol.10, no. 3, pp. 80-83, May-June 2012, doi:10.1109/MSP.2012.68
REFERENCES
1. P.S. Ravikanth, "Physical One-Way Functions," PhD thesis, School of Architecture and Planning, MIT, 2001; http://alumni.media.mit.edu/~pappu/pdfs/Pappu-PhD-POWF-2001.pdf.
2. K. Tolk, Random Patterns and Biometrics for Counterfeit Deterrence, tech report, Sandia Nat'l Labs, 1993; www.osti.gov/energycitations/purl.cover.jsp?purl=/ 10128652-ujvFKonative.
3. K.M. Tolk, "Reflective Particle Technology for Identification of Critical Items," Proc. 33rd Ann. Meeting Inst. of Nuclear Materials Management, 1992, pp. 648–652.
4. B. Gassend et al., "Silicon Physical Random Functions," Proc. 9th ACM Conf. Computer and Communications Security (CCS 02), ACM, 2002, pp. 148–160.
5. J.W. Lee et al., "A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications," Digest of Technical Papers, 2004 Symp. VLSI Circuits, IEEE, 2004, pp. 176–179.
6. J. Guajardo et al., "FPGA Intrinsic PUFs and Their Use for IP Protection," Proc. 9th Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 07), Springer, 2007, pp. 63–80.
7. S.S. Kumar et al., "Extended Abstract: The Butterfly PUF Protecting IP on Every FPGA," Proc. 2008 IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE, 2008, pp. 67–70.
8. R. Maes, P. Tuyls, and I. Verbauwhede, "Intrinsic PUFs from Flip-Flops on Reconfigurable Devices," Proc. 2008 Workshop Information and System Security (WISSec 08), 2008, p. 17.
9. Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Advances in Cryptology: Eurocrypt 2004, LNCS 3027, Springer, 2004, pp. 523–540.
10. G.J. Schrijen and V. van der Leest, "Comparative Analysis of SRAM Memories Used as PUF Primitives," Proc. Design, Automation & Test in Europe Conf. and Exhibition (DATE 12), IEEE, 2012, pp. 1319–1324.
11. G.N. Selimis et al., "Evaluation of 90nm 6T-SRAM as Physical Unclonable Function for Secure Key Generation in Wireless Sensor Nodes," Proc. 2011 IEEE Int'l Symp. Circuits and Systems (ISCAS 11), IEEE, 2011, pp. 567–570.
592 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool