A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Pitfalls of Using Arbiter-PUFs as Building Blocks
2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
In these model building attacks, machine learning is used to determine the internal parameters of the PUF to build an accurate software model. ...
PUFs use the inherent physical differences of every chip to either securely authenticate the chip or generate cryptographic keys without the need of nonvolatile memory. ...
Hence, by either using a more secure PUF as a building block or by choosing a much larger BCH code the attack could be prevented. ...
doi:10.1109/tcad.2015.2427259
fatcat:ntwwiiuic5cgvgdixigkrtw3aa
Security Analysis of PUF-based Key Generation and Entity Authentication
2017
Zenodo
This building block can hence be understood as the silicon equivalent of human biometrics. ...
On the bright side, the lessons learned can help improve the quality of future PUF-based systems. ...
Acknowledgements The authors acknowledge that the responses of a PUF are noisy and mention the existence of fuzzy extractors [39] as well. ...
doi:10.5281/zenodo.2643392
fatcat:2pcr7p76qjbtnh36fuxsdk7enq
A Lightweight Hardware Secure and Reliable Framework using Secure and Provable PUF for IoT Devices against the Machine Learning Attack
2022
North atlantic university union: International Journal of Circuits, Systems and Signal Processing
so on. ...
, and SVM; further evaluation is carried out considering the PUF evaluation parameter as uniqueness and reliability. ...
Becker, “On the pitfalls of using Arbiter-PUFs
as building blocks,” TCAD, vol. 34, no. 8, pp. 1295–
1307, 2015.
[19]. C. ...
doi:10.46300/9106.2022.16.86
fatcat:7na6rztqyrdfhcfeae6nhicbuu
PUFs as Promising Tools for Security in Internet of Things
2016
IEEE design & test
This work was supported in part by the Challenge Grant from the Indian Institute of Technology (IIT), Kharagpur, India and Information Security Education Awareness (ISEA), Deity, India. ...
Sadhukhan, a doctoral student, for helping with the testbed. ...
The LSPUF typically uses lightweight and insecure PUF instances as component building blocks which can be modeled by machine learning (ML). ...
doi:10.1109/mdat.2016.2544845
fatcat:5i7oiwl65jfmpemvk4chlg7ayi
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
[chapter]
2012
Lecture Notes in Computer Science
In this context, we introduce reverse fuzzy extractors, a new approach to correct noise in PUF responses that allows for extremely lightweight implementations on the token. ...
, and supports an unlimited number of authentications without requiring the reader to store a large number of PUF challenge/response pairs. ...
This work has been supported in part by the European Commission under grant agreement ICT-2007-238811 UNIQUE. ...
doi:10.1007/978-3-642-32946-3_27
fatcat:pan7hqz3mfbdxb5ktbgtbieu34
Erasable PUFs
2020
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security
We describe how the Strong PUF can be surrounded with a trusted control logic that allows the blocking (or łerasurež) of single CRPs. ...
Building on this work, this paper is the first to describe a generic method how any given silicon Strong PUF with digital CRP-interface can be turned into an Erasable PUF. ...
Interpose PUFs are constructed from Arbiter PUFs of variable length, and consist of several parallel layers of these Arbiter PUFs, similar to the well-known XOR Arbiter PUF architectures [45] . ...
doi:10.1145/3411504.3421215
fatcat:rcux5s5l5bfipg3yz3xa2yh5wm
Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy
2020
Sensors
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. ...
In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and ...
) and use-cases in the energy utilities. ...
doi:10.3390/s21010028
pmid:33374599
pmcid:PMC7793093
fatcat:h2b4djvqojdehjxrku4nkjl2dq
Machine Learning of Physical Unclonable Functions using Helper Data
2021
Transactions on Cryptographic Hardware and Embedded Systems
We provide results based on simulated data of a k-SUM PUF model and an Arbiter PUF model. ...
This work, however, reveals a pitfall in these constructions: When using state-of-the-art helper data algorithms to correct noisy PUF responses, an attacker can exploit the publicly accessible helper data ...
Acknowledgements This work was partly funded by the German Ministry of Education, Research and Technology through the project SecForCARs (grant number 16KIS0795). ...
doi:10.46586/tches.v2021.i2.1-36
fatcat:5alolkueozghfp6tasykm2pf6y
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version
2020
Journal of Cryptographic Engineering
We provide empirical results proving the side-channel security of the protected cryptographic engine as well as an evaluation of the PUF quality. ...
The lack of accessible secret key storage poses a significant challenge and requires the use of a physical unclonable function (PUF) to generate a device intrinsic secret within the FPGA logic. ...
Building blocks In this section, we describe the functionality of the hardware building blocks that make up the static FPGA configuration of our system: the PUF that generates a device intrinsic secret ...
doi:10.1007/s13389-020-00247-2
fatcat:xgnl4djeznckzatufxling2ywq
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
[chapter]
2015
Lecture Notes in Computer Science
The prototype is implemented on a SASEBO-GII board, using the on-board SRAM as the source of entropy for the PUF and the TRNG. We present three different implementations. ...
The reported results include a full protocol analysis, the design of its building blocks, their integration into a constrained device, and finally its performance evaluation. ...
We build our prototype on top of a SASEBO-GII board, using the resources available on the board to construct the PUF and the protocol engine. ...
doi:10.1007/978-3-662-48324-4_28
fatcat:fhmywbr5mvbelkci34magnxzpq
A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF based Authentication
2020
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
imposed on the type of PUF design or any additional protection on the binary channel used for the authentication. ...
CONCLUSION Security solutions today focus mostly on blocking attacks. ...
doi:10.1109/tcad.2020.3036807
fatcat:mmffbdfnofcp3jrsyrn4wyxk6e
On the Genotype Compression and Expansion for Evolutionary Algorithms in the Continuous Domain
[article]
2021
arXiv
pre-print
This paper investigates the influence of genotype size on evolutionary algorithms' performance. ...
We consider genotype compression (where genotype is smaller than phenotype) and expansion (genotype is larger than phenotype) and define different strategies to reconstruct the original variables of the ...
Usually, strong PUFs rely on delayed-based Arbiter PUFs (APUFs) as their main building blocks for PUF constructs and protocols [24] . ...
arXiv:2105.11502v1
fatcat:dmffglpqorf6nknl66vg5jun2y
Secure Key Generation from Biased PUFs
[chapter]
2015
Lecture Notes in Computer Science
PUF-based key generators based on error-correcting codes were firstly introduced in [12] for Arbiter PUFs and later on in [5] for SRAM PUFs, both using a configuration based on linear block codes. ...
Using innovative approaches, the overhead of these algorithms on PUF size is minimized, while guaranteeing reliability of the system. Related Work. ...
The conclusion of Theorem 4 holds for classic VN debiasing with erasures. It can be extended to pair-output VN debiasing in the same way as 2O-VN. ...
doi:10.1007/978-3-662-48324-4_26
fatcat:lz5d5qfzu5anffgk3md2lp3gbu
Efficient Fuzzy Extraction Of Puf-Induced Secrets: Theory And Applications
2016
Zenodo
The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system. ...
The overall efficiency thereof, typically depending on error-correction with a binary [n; k; d] block code, is determined by the universal and well-known (n - k) bound on the min-entropy loss. ...
Acknowledgment The authors greatly appreciate the support received. The European Union's ...
doi:10.5281/zenodo.55449
fatcat:472252ayczdsnnzo3zjk2edg7i
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
[chapter]
2016
Lecture Notes in Computer Science
The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system. ...
The overall efficiency thereof, typically depending on error-correction with a binary [n, k, d] block code, is determined by the universal and well-known (n − k) bound on the min-entropy loss. ...
Acknowledgment The authors greatly appreciate the support received. The European Union's ...
doi:10.1007/978-3-662-53140-2_20
fatcat:famnb652sreyld2sbg77x5sicy
« Previous
Showing results 1 — 15 out of 69 results