Low-power sub-threshold design of secure physical unclonable functions
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
Hardware intrinsic security from D flip-flops
Proceedings of the fifth ACM workshop on Scalable trusted computing
FPGA time-bounded unclonable authentication
IH'10 Proceedings of the 12th international conference on Information hiding
Efficient authentication for mobile and pervasive computing
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Integrated circuits metering for piracy protection and digital rights management: an overview
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
Physically unclonable functions: manufacturing variability as an unclonable device identifier
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
Accelerometers and randomness: perfect together
Proceedings of the fourth ACM conference on Wireless network security
A practical device authentication scheme using SRAM PUFs
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Security problems of systems of extremely weak devices
Annales UMCS, Informatica - Security Systems
Efficient implementation of true random number generator based on SRAM PUFs
Cryptography and Security
International Journal of Reconfigurable Computing - Special issue on Selected Papers from the International Conference on Reconfigurable Computing and FPGAs (ReConFig'10)
Security'12 Proceedings of the 21st USENIX conference on Security symposium
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
DRV-Fingerprinting: using data retention voltage of SRAM cells for chip identification
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
PHAP: Password based Hardware Authentication using PUFs
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
ClockPUF: physical unclonable functions based on clock networks
Proceedings of the Conference on Design, Automation and Test in Europe
RESP: a robust physical unclonable function retrofitted into embedded SRAM array
Proceedings of the 50th Annual Design Automation Conference
An FPGA chip identification generator using configurable ring oscillators
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Comparative analysis of SRAM memories used as PUF primitives
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
DEMO: Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Bias-based modeling and entropy analysis of PUFs
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Secure PRNG seeding on commercial off-the-shelf microcontrollers
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Fast tag searching protocol for large-scale RFID systems
IEEE/ACM Transactions on Networking (TON)
Digital fingerprints for low-cost platforms using MEMS sensors
Proceedings of the Workshop on Embedded Systems Security
A high reliability PUF using hot carrier injection based response reinforcement
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hardware security: threat models and metrics
Proceedings of the International Conference on Computer-Aided Design
Hi-index | 14.99 |
Intermittently powered applications create a need for low-cost security and privacy in potentially hostile environments, supported by primitives including identification and random number generation. Our measurements show that power-up of SRAM produces a physical fingerprint. We propose a system of Fingerprint Extraction and Random Numbers in SRAM (FERNS) that harvests static identity and randomness from existing volatile CMOS memory without requiring any dedicated circuitry. The identity results from manufacture-time physically random device threshold voltage mismatch, and the random numbers result from runtime physically random noise. We use experimental data from high-performance SRAM chips and the embedded SRAM of the WISP UHF RFID tag to validate the principles behind FERNS. For the SRAM chip, we demonstrate that 8-byte fingerprints can uniquely identify circuits among a population of 5,120 instances and extrapolate that 24-byte fingerprints would uniquely identify all instances ever produced. Using a smaller population, we demonstrate similar identifying ability from the embedded SRAM. In addition to identification, we show that SRAM fingerprints capture noise, enabling true random number generation. We demonstrate that a 512-byte SRAM fingerprint contains sufficient entropy to generate 128-bit true random numbers and that the generated numbers pass the NIST tests for runs, approximate entropy, and block frequency.