Filters








16,162 Hits in 4.8 sec

Delay-based circuit authentication and applications

Blaise Gassend, Dwaine Clarke, Marten van Dijk, Srinivas Devadas
2003 Proceedings of the 2003 ACM symposium on Applied computing - SAC '03  
We describe a circuit architecture for a key card for which authentication is delay based, rather than based on a digital secret key.  ...  We describe a technique to reliably identify individual integrated circuits (ICs), based on a prior delay characterization of the IC.  ...  ACKNOWLEDGEMENTS We thank Tara Sainath and Ajay Sudan for help with the FPGA experiments.  ... 
doi:10.1145/952532.952593 dblp:conf/sac/GassendCDD03 fatcat:sawygsfa25ha7n3ywduragcgkq

Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications

Srinivas Devadas, Edward Suh, Sid Paral, Richard Sowell, Tom Ziola, Vivek Khandelwal
2008 2008 IEEE International Conference on RFID  
We also highlight the advantages of PUF based RFIDs in anti-counterfeiting and security applications.  ...  The PUF-enabled RFID has been fabricated in 0.18 technology, and extensive testing results demonstrate that PUFs can securely authenticate an RFID with minimal overheads.  ...  Figure 1 illustrates a silicon PUF delay circuit based on MUXes and an arbiter.  ... 
doi:10.1109/rfid.2008.4519377 fatcat:kcivan3lifanpkh5saelakezli

A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices

Tarek A. Idriss, Haytham A. Idriss, Magdy A. Bayoumi
2021 IEEE Access  
PUFS IN AUTHENTICATION PROTOCOLS A. DELAY ARBITER PUF We examine the delay arbiter PUF [6] , as it is one of the earliest and most studied silicon-based PUFs.  ...  PUF-based authentication protocols.  ... 
doi:10.1109/access.2021.3084903 fatcat:6dfal5bbw5dnnmgxds7koebwji

Identification and authentication of integrated circuits

Blaise Gassend, Daihyun Lim, Dwaine Clarke, Marten van Dijk, Srinivas Devadas
2004 Concurrency and Computation  
This paper describes a technique to reliably and securely identify individual integrated circuits (ICs) based on the precise measurement of circuit delays and a simple challengeresponse protocol.  ...  Finally, we analyze the difficulty of breaking the system in an idealized additive delay model.  ...  An overview of our approach to identify and authenticate ICs based on delays is given in Section 3. Then, in Section 4 we describe some applications, in particular a secure key card application.  ... 
doi:10.1002/cpe.805 fatcat:zogqsvujufexrntagh6ax7smmy

SANSCrypt: A Sporadic-Authentication-Based Sequential Logic Encryption Scheme [article]

Yinghua Hu, Kaixin Yang, Shahin Nazarian, Pierluigi Nuzzo
2020 arXiv   pre-print
Analysis and validation results on a set of benchmark circuits show that SANSCrypt offers a substantial output corruptibility if the key sequences are applied incorrectly.  ...  to a protocol based on pseudo-random number generation.  ...  ACKNOWLEDGMENT This work was partially sponsored by the Air Force Research Laboratory (AFRL) and the Defense Advanced Research Projects Agency (DARPA) under agreement number FA8560-18-1-7817.  ... 
arXiv:2010.05168v1 fatcat:hkqj2o2yszhznjeky3b6fz4l6y

At-speed delay characterization for IC authentication and Trojan Horse detection

Jie Li, John Lach
2008 2008 IEEE International Workshop on Hardware-Oriented Security and Trust  
to provide the desired authentication and design alteration (including HTH implantation) detection.  ...  This low-cost delay measurement technique does not affect the main IC functionality and can be performed at-speed at both test-time and run-time.  ...  ACKNOWLEDGMENTS This work was supported by the National Science Foundation under grants CNS-0716443 and IIS-0612049.  ... 
doi:10.1109/hst.2008.4559038 dblp:conf/host/LiL08 fatcat:ni6dab5rrrgzdggh2b6c4iy6fi

Application of PUF-Enabled RFID Tags in Electronic Banking

Saeed Mehmandoust, Reza Ebrahimi Atani
2011 International Journal of Computer Science & Information Technology (IJCSIT)  
We propose solutions based on physical unclonable functions (PUF) and provide a suitable security protocol for tag authentication in off-line environments.  ...  Radio Frequency Identification (RFID) tags have a variety of applications in e-banking. For effective utilization of the technology, this should be reinforced toward security holes and attacks.  ...  Some models of PUFs use the intrinsic properties of silicon based integrated circuits. Most important types of silicon PUFs use logic gate delays.  ... 
doi:10.5121/ijcsit.2011.3214 fatcat:n66rlou3qrelbhuwusbiz3cvlu

Physical unclonable functions for device authentication and secret key generation

G. Edward Suh, Srinivas Devadas
2007 Proceedings - Design Automation Conference  
We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and  ...  Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs).  ...  Figure 1 illustrates a silicon PUF delay circuit based on MUXes and an arbiter.  ... 
doi:10.1145/1278480.1278484 dblp:conf/dac/SuhD07 fatcat:ymjyfff3xjctljpoqmxtcoxuma

Physical Unclonable Functions for Device Authentication and Secret Key Generation

G. Edward Suh, Srinivas Devadas
2007 Proceedings - Design Automation Conference  
We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and  ...  Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs).  ...  Figure 1 illustrates a silicon PUF delay circuit based on MUXes and an arbiter.  ... 
doi:10.1109/dac.2007.375043 fatcat:4k4bn44qvneklfcz3tj4vkulcu

Extracting secret keys from integrated circuits

Daihyun Lim, J.W. Lee, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas
2005 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
Arbiter-based Physical Unclonable Functions (PUFs) is proposed to exploit the statistical delay variation of wires and transistors across ICs in a manufacturing process to build unextractable secret keys  ...  However, sophisticated tampering methods have been devised to extract secret keys stored in digital integrated circuits (ICs) from conditional access systems such as smartcards and ATMs.  ...  Introduction For many applications that need to identify and authenticate users, system security is based on the protection of secret keys.  ... 
doi:10.1109/tvlsi.2005.859470 fatcat:i74zgxb5qnhzbcobb7ldklv6ey

Ring Oscillator and its application as Physical Unclonable Function (PUF) for Password Management [article]

Alireza Shamsoshoara
2019 arXiv   pre-print
Ring oscillators are the principal parts of PUFs that are synthesized on a field-programmable gate array (FPGA) or an application-specific integrated circuit (ASIC).  ...  Similar to other electronic devices such as read access memory (RAM) and storage, mobile devices require to authenticate and to be authenticated in a secure way.  ...  Ring Oscillator and its application as Physical Unclonable Function (PUF) for Password Management Alireza Shamsoshoara  ... 
arXiv:1901.06733v1 fatcat:6bdnjjjxuvgl7g2it4qhfedfjq

A Reliable Current Starved Inverter based Arbiter PUF Architecture for IoT Applications

2019 International Journal of Engineering and Advanced Technology  
In this paper, we proposed a Current starved Inverter (CSI) based arbiter PUF which enhances the non- linearity and randomness.  ...  In the recent years, Physical Unclonable Functions(PUFs) are emerged to be one of the lightweight hardware security primitives for device authentication, identification, such as Internet of things (IoT  ...  Hence these type of the circuits can be suitable for the resource constrained devices such as IoT based applications.  ... 
doi:10.35940/ijeat.a1038.1291s52019 fatcat:nghec6mtaneqngg5jotkldnpm4

AEGIS: A single-chip secure processor

G. Edward Suh, Charles W. O'Donnell, Srinivas Devadas
2005 Information Security Technical Report  
This article presents the AEGIS secure processor architecture, which enables new applications by ensuring private and authentic program execution even in the face of physical attack.  ...  First, we describe Physical Random Functions which reliably protect and share secrets in a manner that is cheaper and more secure than existing solutions based on non-volatile memory.  ...  While PUFs can be implemented with various physical systems, we use silicon PUFs (SPUFs) that are based on the hidden timing and delay information of integrated circuits.  ... 
doi:10.1016/j.istr.2005.05.002 fatcat:fs4yl5r63ba5tlciuudzw67oha

Nanotechnology-based trusted remote sensing

James B. Wendt, Miodrag Potkonjak
2011 2011 IEEE SENSORS Proceedings  
Current public physical unclonable function designs encompass complex circuits requiring high measurement accuracy and whose size slows down the authentication process.  ...  We contribute new nanotechnology-based security protocols for authentication and time-stamping for trusted remote sensing. I. 978-1-4244-9289-3/11/$26.00 ©2011 IEEE  ...  One of the first integrated circuit PUFs, the delay-based silicon PUF, leverages the intrinsic process variation of submicron technologies in order to be unique and unclonable [4] .  ... 
doi:10.1109/icsens.2011.6127174 fatcat:qkl7eaezn5akdpofinixjoydxu

Time-Bounded Authentication of FPGAs

M. Majzoobi, F. Koushanfar
2011 IEEE Transactions on Information Forensics and Security  
A suite of authentication protocols is introduced based on the time-bounded mechanism.  ...  This paper introduces a novel technique to authenticate and identify field programmable gate arrays (FPGAs).  ...  In this section, we present a PUF circuit based on the delay characterization circuit shown in Figure 2 .  ... 
doi:10.1109/tifs.2011.2131133 fatcat:4ohm2l53onc3xpzspoy7qxavpi
« Previous Showing results 1 — 15 out of 16,162 results