20 Hits in 6.5 sec

Run-Time Accessible DRAM PUFs in Commodity Devices [chapter]

Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
2016 Lecture Notes in Computer Science  
This paper is the first to enable the run-time access of decay-based intrinsic DRAM PUFs in commercial off-the-shelf systems, which requires no additional hardware or FPGAs.  ...  So far, most PUF constructions require addition of new hardware or FPGA implementations for their operation. Recently, intrinsic PUFs, which can be found in commodity devices, have been investigated.  ...  The authors would like to thank Kevin Ryan and Ethan Weinberger for their help with building the heater setup used in the experiments, and Intel for donating the Intel Galileo boards used in this work.  ... 
doi:10.1007/978-3-662-53140-2_21 fatcat:3tpuyvnymvg4tfnpqzjz7fkjp4

Intrinsic Physical Unclonable Function (PUF) Sensors in Commodity Devices

Shuai Chen, Bing Li, Yuan Cao
2019 Sensors  
Furthermore, we configured the DRAM PUF-based sensor in a DRAM PUF-based key generation scheme which improves the practicability of the design.  ...  It can be difficult to implemented in commercial off-the-shelf devices.  ...  Acknowledgments: We would like to thank Jakub Szefer and Wenjie Xiong for guidance and help with the PUF implementation on Rpi.  ... 
doi:10.3390/s19112428 fatcat:tded54czafff3mkm7vzr23oqfi

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security

Andre Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
2017 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
In this work, we present a new type of a memory-based intrinsic PUF, which leverages the Rowhammer effect in DRAM modules; the Rowhammer PUF.  ...  Our PUF makes use of bit flips, which occur in DRAM cells due to rapid and repeated access of DRAM rows.  ...  The resulting PUF readout time is similar to existing runtime accessible decay-based DRAM PUFs. B.  ... 
doi:10.1109/hst.2017.7951729 dblp:conf/host/SchallerXASG0S17 fatcat:6z6ecd5fxjhthhcjm3ibv5gg3u

An Overview of DRAM-Based Security Primitives

Nikolaos Anagnostopoulos, Stefan Katzenbeisser, John Chandy, Fatemeh Tehranipoor
2018 Cryptography  
Security primitives based on Dynamic Random Access Memory (DRAM) can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet  ...  two types of DRAM-based security primitives.  ...  This work has also been supported by Comcast Corporation, a company headquartered in Philadelphia, PA, USA, and Honeywell International Inc., a company headquarted in Morris Plains, NJ, USA.  ... 
doi:10.3390/cryptography2020007 fatcat:43ohhg2ctzhrzlv7msocufwg3e

Fast DRAM PUFs on Commodity Devices

Jack Miskelly, Maire OrNeill
2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
implementing a 800 DRAM latency PUF on commodity hardware.  ...  DRAM-Based PUFs 269 As a ubiquitous technology found in a wide range of 270 devices the idea of using DRAM as the core hardware for 271 an Intrinsic PUF has been explored in several works.  ... 
doi:10.1109/tcad.2020.3012218 fatcat:oqjx2lby5bdf5hilt66hp4nmpq

Improving DRAM Performance, Security, and Reliability by Understanding and Exploiting DRAM Timing Parameter Margins [article]

Jeremie S. Kim
2021 arXiv   pre-print
This dissertation rigorously characterizes many modern commodity DRAM devices and shows that by exploiting DRAM access timing margins within manufacturer-recommended DRAM timing specifications, we can  ...  Third, we propose a random number generator that is based on our observation that timing failures in certain DRAM cells are randomly induced and can thus be repeatedly polled to very quickly generate true  ...  PUF without modifying commodity DRAM devices, 2) introduce an effective DRAM PUF that is runtime-accessible at all operating temperatures, 3) demonstrate a wide variety of tradeoffs in DRAM PUFs, based  ... 
arXiv:2109.14520v1 fatcat:7hhrlz3tfjgx5fekdblfawxf3a

Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †

Nikolaos Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser
2018 Cryptography  
Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic  ...  speed up the generation times for the responses of PUFs based on these retention times.  ...  Run-Time Row Hammer PUF Implementations in Commodity DRAM In this section, we examine in detail the different parameters and factors that can affect the operation of a Row Hammer PUF.  ... 
doi:10.3390/cryptography2030013 fatcat:ec6iyndbpfdkreqa27aj53ewna

D-RaNGe: Using Commodity DRAM Devices to Generate True Random Numbers with Low Latency and High Throughput [article]

Jeremie S. Kim, Minesh Patel, Hasan Hassan, Lois Orosa, Onur Mutlu
2018 arXiv   pre-print
To demonstrate that our TRNG design is viable using commodity DRAM chips, we rigorously characterize the behavior of activation failures in 282 state-of-the-art LPDDR4 devices from three major DRAM manufacturers  ...  We propose a new DRAM-based true random number generator (TRNG) that leverages DRAM cells as an entropy source.  ...  There are a number of proposals to construct TRNGs using commodity DRAM devices, which we summarize in Table 2 based on their entropy sources.  ... 
arXiv:1808.04286v2 fatcat:32gvtbf56jclzh4sflno2g4cde

Improving DRAM Performance, Security, and Reliability by Understanding and Exploiting DRAM Timing Parameter Margins

Jeremie Kim
repeatedly accessing a DRAM row can cause failures in unaccessed neighboring DRAM rows.To advance DRAM-based discoveries and mechanisms, this dissertation rigorously characterizes many modern commodity  ...  , 2) DRAM-based physical unclonable functions (PUFs), a method for generating unique device-dependent keys for identification and authentication, and 3) the RowHammer vulnerability, a phenomenon where  ...  PUF without modifying commodity DRAM devices, 2) introduce an effective DRAM PUF that is runtime-accessible at all operating temperatures, 3) demonstrate a wide variety of tradeoffs in DRAM PUFs, based  ... 
doi:10.1184/r1/13318703.v1 fatcat:fci5qe6uereetizpk7w2k56ewa

Simulation of Fusion Plasmas: Current Status and Future Direction

D A Batchelor, M Beck, A Becoulet, R V Budny, C S Chang, P H Diamond, J Q Dong, G Y Fu, A Fukuyama, T S Hahm, D E Keyes, Y Kishimoto (+17 others)
2007 Plasma Science and Technology  
Acknowledgments: This work is supported in part by the US DoE Contract No. DE-AC02-76CH03073 [1]  ...  the walls and divertor targets, and Ar from gas puffing to increase the energy radiated in the divertor scrape-off layer flow region.  ...  fusion devices.  ... 
doi:10.1088/1009-0630/9/3/13 fatcat:qultg3zae5dqtcyqm6lktxgdve

Dagstuhl Reports, Volume 9, Issue 8, August 2019, Complete Issue [article]

canonical form does not require the run length encoding of the curve used in the paper by Erickson and Whittelsey [1].  ...  The power of random information David Krieg (Johannes Kepler Universität Linz, AT) -Computation in Low-Dimensional Geometry and Topology The above observation seems to imply that the computation of a  ...  HESP is demonstrated on commodity, off-the-shelf computing devices, where a DRAM PUF is used as an instance of a Dynamic PUF. obfuscations keep up with state-of-the-art code analysis, and where we stand  ... 
doi:10.4230/dagrep.9.8 fatcat:godr3ux3jzeofmbvgcjfizw7i4

The art of popular fiction: gender, authorship and aesthetics in the writing of Ouida [article]

Carla Jane Molloy, University Of Canterbury
authorship in the mid-nineteenth century.  ...  This thesis examines the popular Victorian novelist Ouida (Maria Louisa Ramé) in the context of women's authorship in the second half of the nineteenth century.  ...  upon which it was based.  ... 
doi:10.26021/4717 fatcat:gj4duf3g7rhavfa2coi3chalq4

Waverley, or 'Tis Sixty Years Since (1814) [chapter]

2017 Reading the Eighteenth-Century Novel  
" Sae lang, that I could weel tak a dram." " Gudewife, bring the gill stoup."  ...  in Little Britain, well known to deal in such commodities, and to whom he was instructed to address himself in a particular phrase, and with a certain sign, which, it seems, passed at that time current  ...  These owe their birth to genial May ; Beneath a fiercer sun they pine, Before the winter storm decay -And can their \s orth be type of thine ? No !  ... 
doi:10.1002/9781118621097.ch10 fatcat:goichvnmfraxhew5zc7zxsnsba


Amy Hackney, Blackwell Blackwell, An Imprint
. • The most comprehensive pocket-size dictionary • Easy-to-understand definitions • Written by a leading authority in the field W ith M OR E TH AN 3 0 0 O Le ga l Te rm s an d Ph ra se s ESSENTIAL LAW  ...  A draft of money payable on a specific day. dram shop act. N.  ...  telephones or other devices.  ... 

Bluegrass Crattsman: Being the Reminiscences of Ebenezer Hiram Stedma Papermaker, 1808-1885

John W. Oliver, Frances L. S. Dugan, Jacqueline P. Bull
1960 The Journal of southern history  
And while i think of it i will Mention many men i knew in Frankfort and often met thare  ...  Collot listed white paper as one of the commodities most useful for barter in the frontier settlements.  ...  The Banks of the River In Some places ware thronged with Spectators gazing in Speachless astonishment at the Puffing and Smoking phenomenon.  ... 
doi:10.2307/2954364 fatcat:ua77jvvbizcyliwgwuomex2fqq
« Previous Showing results 1 — 15 out of 20 results