The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2010 vol.27)
pp: 48-65
Meng-Day Yu , Verayo, San Jose, CA, USA
S. Devadas , Massachusetts Inst. of Technol., Cambridge, MA, USA
Physical unclonable functions (PUFs) offer a promising mechanism that can be used in many security, protection, and digital rights management applications. One key issue is the stability of PUF responses that is often addressed by error correction codes. The authors propose a new syndrome coding scheme that limits the amount of leaked information by the PUF error-correcting codes.
Robustness, Error correction, Error correction codes, Application software, Working environment noise, Semiconductor devices, Circuits, Hamming distance, Temperature, Voltage,design and test, ECC, error correction, error-correcting code, index-based syndrome coding, key generation, physical unclonable function, syndrome coding
Meng-Day Yu, S. Devadas, "Secure and Robust Error Correction for Physical Unclonable Functions", IEEE Design & Test of Computers, vol.27, no. 1, pp. 48-65, January/February 2010, doi:10.1109/MDT.2010.25
1. B. Gassend, "Physical Random Functions," master's thesis, Department of EECS, Massachusetts Inst. of Tech., 2003.
2. B. Gassend et al., "Silicon Physical Random Functions," Proc. ACM Computer Communication Security Conf., ACM Press, 2002, pp. 148-160.
3. G.E. Suh, "AEGIS: A Single-Chip Secure Processor," PhD thesis, Electrical Eng. and Computer Science Dept., Massachusetts Inst. of Tech., 2005.
4. M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Lightweight Secure PUFs," Proc. Int'l Conf. Computer-Aided Design (ICCAD 08), IEEE CS Press, 2008, pp. 670-673.
5. M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Testing Techniques for Hardware Security," Proc. Int'l Test Conf. (ITC 08), IEEE CS Press, 2008, pp. 1-10.
6. D. Lim, "Extracting Secret Keys from Integrated Circuits," master's thesis, Department of EECS, Massachusetts Inst. of Tech., 2004.
7. Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Proc. Eurocrypt 2004, LNCS 3027, Springer, 2004, pp. 523-540.
8. R. Maes, P. Tuyls, and I. Verbauwhede, "Intrinsic PUFs from Flip-flops on Reconfigurable Devices," Proc. Benelux Workshop Information and System Security (WISSec 08), 2008.
9. D.E. Holcomb, W.P. Burleson, and K. Fu, "Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags," Proc. Conf. Radio Frequency Identification Security (RFID 07), 2007; .
10. R. Maes, P. Tuyls, and I. Verbauwhede, "A Soft Decision Helper Data Algorithm for SRAM PUFs," IEEE Int'l Symp. Information Theory (ISIT 09), IEEE Press, 2009.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool