A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs
[chapter]
2013
Lecture Notes in Computer Science
remanence decay in SRAM and used as a time-keeping mechanism for low-power clock-less devices. ...
We discuss countermeasures against our attack and propose the constructive use of remanence decay to improve the cloning-resistance of SRAM PUFs. ...
The development and manufacturing of the PUF ASIC used in this work has been supported by the European Commission under grant agreement ICT-2007-238811 UNIQUE. ...
doi:10.1007/978-3-642-40349-1_7
fatcat:mtf264pdc5b2la3ppusr7quz6m
Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory
2018
Journal of Hardware and Systems Security
However, data remanence effect in SRAM and Flash/EEPROM makes secure erasure process more challenging. ...
When it comes to the security of semiconductor devices, both data remanence and data retention issues could lead to possible data recovery by an attacker. ...
Data Remanence Experiments In the first set of experiments, the chips were tested for SRAM data remanence at room temperature (+ 20°C), low temperatures down to − 30°C, and high temperatures up to + 80 ...
doi:10.1007/s41635-018-0050-5
fatcat:id5qudgntfgj7mjwcmqartef7a
Physical and Mechatronic Security, Technologies and Future Trends for Vehicular Environment
[article]
2018
arXiv
pre-print
A survey is attempting to demonstrate the techniques so far known as Physically Unclonable Functions PUFs showing their advantages and drawbacks. ...
The automotive industry is facing a challenge to produce low-cost and highly safe and secure networked automotive systems. ...
Mechatronic security (Physical Security) is going to play a fundamental role as a security anchor in all future vehicular systems as DNA in the very robust and reliable natural biological systems. ...
arXiv:1805.07570v1
fatcat:rx5s22f7tfgmvcgujqwflwgthi
An Overview of DRAM-Based Security Primitives
2018
Cryptography
Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs), and present the applications of each of the ...
hardware implementations are less exposed to attackers than software ones. ...
However, PRNGs are also very popular due to their flexible and low-cost implementations and their low generation times [51] . ...
doi:10.3390/cryptography2020007
fatcat:43ohhg2ctzhrzlv7msocufwg3e
A Novel SRAM PUF Stability Improvement Method Using Ionization Irradiation
2020
Electronics
Commercial SRAM chips could be used as PUF chips for low cost systems. ...
To address this issue, this paper proposes a novel SRAM PUF stability improvement method using total ionization dose (TID) effect for commercial SRAM chips. ...
Commercial SRAM chips could be used as PUF chips for low cost systems. ...
doi:10.3390/electronics9091498
fatcat:7vwmhcdopngavctvlhmpknvxsm
A 2 Bit/Cell Tilting SRAM-Based PUF with a BER of 3.1e-10 and an Energy of 21 fJ/bit in 65nm
2020
IEEE Open Journal of Circuits and Systems
The cell demonstrated a highly competitive area of 1420F 2 per bit, a bit-error-rate (BER) of 3.1E-10, and a very low energy consumption of 21fJ/bit in 65nm. ...
An SRAM-based Physical Unclonable Function (PUF) with two independent bits/cells is presented along with a tilting preselection test designed to identify all the unstable bits. ...
It is also more resistant to power probing attacks [7] and to low-temperature data remanence attacks [9] , as the charge in the internal nodes is reset prior to each PUF evaluation. ...
doi:10.1109/ojcas.2020.3034266
fatcat:3p2ybgvgineadiuojhoi2gky4a
Physical Unclonable Functions and Applications: A Tutorial
2014
Proceedings of the IEEE
| This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. ...
It describes strong PUF implementations and their use for lowcost authentication. After this description, the paper covers both attacks and protocols to address errors. ...
The data remain ''stored'' in the SRAM cell for a certain short time after the cell is powered down due to an effect called ''data remanence.' ' Oren et al. ...
doi:10.1109/jproc.2014.2320516
fatcat:5vlcesm54fhxjparjkhhu5dn6a
Lightweight hardware fingerprinting solution using inherent memory in off-the-shelf commodity devices
2022
Indonesian Journal of Electrical Engineering and Computer Science
Therefore, we concluded that the available SRAM in off-the-shelf commodity hardware has good quality to be used as PUF. ...
Non-volatile memory (NVM) architecture like SRAM is available in off-the-shelf microcontroller devices. Exploiting the inherent SRAM as PUF could wide-spread the adoption of PUF. ...
remanence in SRAM cells [23] . ...
doi:10.11591/ijeecs.v25.i1.pp105-112
fatcat:y34cept7ebd4zjhm353ctacjby
Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells
2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
To evaluate the security and performance of the DRV PUF, we use DRV measurements from commercially available SRAM chips, and use data from a novel DRV prediction algorithm. ...
However, DRV is highly sensitive to temperature, and until now this makes it unreliable and unsuitable for use in a PUF. ...
An experimental evaluation of low-temperature data remanence on a variety of SRAMs is provided by Skorobogatov [14] , and SRAM remanence in radio-frequency identification (RFID) has been studied by Saxena ...
doi:10.1109/tcad.2015.2418288
fatcat:3zttfyfrzbesrnfhlwd6tv2dyy
Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices
[article]
2018
arXiv
pre-print
(TRNG) to produce random sequences with a very low overhead; a DRAM TRNG model using its startup value behavior for creating random bit streams; an efficient power supply noise based TRNG model for generating ...
Furthermore, the Internet of Things (IoT) adopts a large number of these hardware-based security and prevention solutions in order to securely exchange data in resource efficient manner. ...
attacks. ...
arXiv:1806.05332v1
fatcat:z3umfrzzebchtg6kgsspfs6rty
Device aging: A reliability and security concern
2018
2018 IEEE 23rd European Test Symposium (ETS)
According, this paper targets a high performance SRAM memory realized in 14nm FinFET technology and depicts how aging degrades the individual components of this memory as well as the interaction between ...
Thus the digital fingerprint can be made extremely robust by using a very small fraction of the strongest cells in a large SRAM. ...
BTI stress can also be used to increase the robustness of the strong SRAM cells used in the identifier bits that form the unique digital fingerprint. (Such cells can also be used as SRAM PUFs.) ...
doi:10.1109/ets.2018.8400702
dblp:conf/ets/KraakTHWCCSWK18
fatcat:5twnv5eofzahdpsxtlydipwfiq
Data remanence effects on memory-based entropy collection for RFID systems
2011
International Journal of Information Security
Second, RAM is subject to data remanence; there is a period after losing power during which stored data remains intact in memory. ...
A recent proposal, Fingerprint Extraction and Random Number Generation in SRAM (FERNS), uses onboard RAM as a randomness source. ...
Other Issues In addition to data remanence, SRAM is subject to a less well known effect called "burn-in." ...
doi:10.1007/s10207-011-0139-0
fatcat:jbqmoobr7bb4pps4m3ci6lpku4
DRAMNet: Authentication based on Physical Unique Features of DRAM Using Deep Convolutional Neural Networks
[article]
2019
arXiv
pre-print
To evaluate our proposed approach, we utilize data from three Commercial-Off-The-Shelf (COTS) DRAMs taken under various environmental and other conditions (high/low temperature, high/low supply voltage ...
However, there are two types of attack challenges that can affect AVs and are yet to be resolved, i.e., sensor attacks and vehicle access attacks. ...
To evaluate our approach, we utilized data from three COTS DRAM modules taken under various environmental and other conditions, such as high/low temperature, high/low supply voltage and aging effects. ...
arXiv:1902.09094v1
fatcat:siyriw47wjfcbeefbfejzkebke
Emerging Physical Unclonable Functions With Nanotechnology
2016
IEEE Access
Physical Unclonable Functions (PUFs) are increasingly used for authentication and identification applications as well as cryptographic key generation. ...
In this paper, we review emerging nanotechnology-based PUFs. ...
For example, the SRAM PUF has been broken in a non-invasive way through a fault injection attack based on remanence decay in volatile memory [95] , and semi-invasive and fully invasive attack methods ...
doi:10.1109/access.2015.2503432
fatcat:3x4sayz2draqxbbd6aubrnn4uy
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †
2018
Cryptography
Additionally, we also provide a more thorough investigation of the effects of temperature variations on the Row Hammer PUF and briefly discuss potential statistical relationships between the cells used ...
As our results prove, the Row Hammer PUF could potentially provide an adequate level of security for Commercial Off-The-Shelf (COTS) devices, if its dependency on temperature is mitigated, and, may therefore ...
, also data remanence effects can start to affect its operation [56] . ...
doi:10.3390/cryptography2030013
fatcat:ec6iyndbpfdkreqa27aj53ewna
« Previous
Showing results 1 — 15 out of 30 results