9 Hits in 7.0 sec

Physically Unclonable Functions and AI: Two Decades of Marriage [article]

Fatemeh Ganji, Shahin Tajik
2021 arXiv   pre-print
The main focus here is to explore the methods borrowed from AI to assess the security of a hardware primitive, namely physically unclonable functions (PUFs), which has found applications in cryptographic  ...  Such a connection between AI and software security has been confirmed and well-reviewed in the relevant literature.  ...  We are also very thankful to Domenic Forte for his guidance, tremendous support during our stay at the University of Florida, and encouragement, in particular, to make the tools (PUFmeter) publicly available  ... 
arXiv:2008.11355v2 fatcat:jxt5iueznzhqlmbcsbbgu3kzua

Lightweight secure PUFs

Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potkonjak
2008 2008 IEEE/ACM International Conference on Computer-Aided Design  
To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design.  ...  Statistical analysis of the new structure and its comparison with existing PUFs indicates a significantly lower predictability, and higher resilience against circuit faults, reverse engineering and other  ...  Input Network We design the input network connected to the parallel PUF's challanges (the dashed box in Figure 2 ) to satisfy the Strict Avalanche Criterion (SAC) for a parallel PUF circuit.  ... 
doi:10.1109/iccad.2008.4681648 dblp:conf/iccad/MajzoobiKP08 fatcat:3hv7bbtduzdpla7767wst3erh4

A Physical Unclonable Function with Redox-based Nanoionic Resistive Memory [article]

Jeeson Kim, Taimur Ahmed, Hussein Nili, Jiawei Yang, Doo Seok Jeong, Paul Beckett, Sharath Sriram, Damith C. Ranasinghe, Omid Kavehei
2016 arXiv   pre-print
We present a physical one-way function, nonlinear resistive Physical Unclonable Function (nrPUF), potentially applicable in variety of cyber-physical security applications given its performance characteristics  ...  , tiny and secure Physically Unclonable Functions (PUFs).  ...  To meet the strict avalanche criterion (SAC) requirement, r i ⊕r Ref , which represents whether a transition in i th response bit occured compared to the reference response (r Ref ), should result in a  ... 
arXiv:1611.04665v1 fatcat:ijqjcfe7mbgyvpwjvlffhicypa

A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security

Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen
2018 IEEE transactions on computers  
Moreover, MPUF variants are the first APUF compositions, to the best of our knowledge, that can achieve Strict Avalanche Criterion without any additional hardware.  ...  Arbiter Physically Unclonable Function (APUF), while being relatively lightweight, is extremely vulnerable to modeling attacks.  ...  INTRODUCTION S INCE the introduction of Arbiter Physically Unclonable Function (APUF) in [1] , several applications [2] - [4] of APUF in lightweight and secure protocol design have been proposed.  ... 
doi:10.1109/tc.2017.2749226 fatcat:gyzhptn3rjd33klcmz4cxsisoq

Inconsistency of Simulation and Practice in Delay-based Strong PUFs

Anita Aghaie, Amir Moradi
2021 Transactions on Cryptographic Hardware and Embedded Systems  
The developments in the areas of strong Physical Unclonable Functions (PUFs) predicate an ongoing struggle between designers and attackers.  ...  physical unclonability.  ...  Acknowledgments The work described in this paper has been supported in part by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -EXC 2092 CASA.  ... 
doi:10.46586/tches.v2021.i3.520-551 fatcat:5sijtzuvuncnbkm6mpuvhdpaku

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
To facilitate the registration of unique features, a so-called physically unclonable function (PUF) can be implemented on the IC.  ...  On the bright side, the lessons learned can help improve the quality of future PUF-based systems.  ...  We make abstraction of the noisiness issue in the remainder of our analysis. The authors provide only a vague, informal description of the logic that is used to recover from a desynchronized state i.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq

The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks

Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten Van Dijk
2019 Transactions on Cryptographic Hardware and Embedded Systems  
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, and which possesses a rigorous security argument, has been a fundamental problem in PUF research since  ...  that exploit the stability of single CRPs (we are the first to provide a detailed analysis of when the reliability based CMA-ES attack is successful and when it is not applicable).  ...  Ulrich Rührmair gratefully acknowledges funding by the PICOLA project of the German Bundesministerium für Bildung und Forschung (BMBF).  ... 
doi:10.13154/tches.v2019.i4.243-290 dblp:journals/tches/NguyenSJMRD19 fatcat:dz4sttvaezalnbfbw5t5xojhje

A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems [article]

Solon Falas, Charalambos Konstantinou, Maria K. Michael
2021 arXiv   pre-print
Our security analysis shows that our framework is resilient to a variety of attack vectors. The experimental setup demonstrates the feasibility of the approach.  ...  Thus, firmware updates are an essential part of device functionality.  ...  Partial support was also provided by the Woodrow W. Everett, Jr. SCEEE Development Fund in cooperation with the Southeastern Association of Electrical Engineering Department Heads.  ... 
arXiv:2007.09071v4 fatcat:5js7zgawk5azhne466brhx44ky

SECURWARE 2015 Committee SECURWARE Advisory Chairs

Rainer Falk, Hans-Joachim Hof, William Dougherty, Secern Consulting -Charlotte, Hans-Joachim Usa, Hof, Peter Müller, Syed Naqvi, Juha Rőning, Mariusz Jakubowski, Microsoft Research, William Dougherty (+163 others)
We hope that SECURWARE 2015 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in emerging security information,  ...  We are grateful to the members of the SECURWARE 2015 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  ACKNOWLEDGMENT The authors acknowledge the financial support given to this work, under the project "Security Technologies for Mobile Environments -TSAM", granted by the  ...