Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Controlled Physical Random Functions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
A Low-Cost Solution for Protecting IPs Against Scan-Based Side-Channel Attacks
VTS '06 Proceedings of the 24th IEEE VLSI Test Symposium
Physical unclonable functions for device authentication and secret key generation
Proceedings of the 44th annual Design Automation Conference
Controlled physical random functions and applications
ACM Transactions on Information and System Security (TISSEC)
Securing Designs against Scan-Based Side-Channel Attacks
IEEE Transactions on Dependable and Secure Computing
Remote activation of ICs for piracy prevention and digital right management
Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design
Towards Robust Low Cost Authentication for Pervasive Devices
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
At-speed delay characterization for IC authentication and Trojan Horse detection
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Extended abstract: The butterfly PUF protecting IP on every FPGA
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
IC activation and user authentication for security-sensitive systems
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Extracting secret keys from integrated circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Offline hardware/software authentication for reconfigurable platforms
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Proceedings of the 47th Design Automation Conference
Physically unclonable functions: manufacturing variability as an unclonable device identifier
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
Clockless physical unclonable functions
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
ClockPUF: physical unclonable functions based on clock networks
Proceedings of the Conference on Design, Automation and Test in Europe
A transmission gate physical unclonable function and on-chip voltage-to-digital conversion technique
Proceedings of the 50th Annual Design Automation Conference
An FPGA chip identification generator using configurable ring oscillators
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Hi-index | 0.00 |
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including encryption of communication channels and IP protection in FPGAs. The vulnerabilities of conventional keys derived from digital data can be mitigated if the keys are instead derived from the inherent statistical manufacturing variations of the IC. Robust silicon-derived keys are implemented using physically unclonable functions (PUFs). A PUF consists of a specialized hardware circuit and a mechanism to retrieve a set of responses under a variety of different challenges. In this paper, we propose a PUF that is based on the measured equivalent resistance variations in the power distribution system (PDS) of an IC. The effectiveness of the PUF is evaluated on twenty-four ICs fabricated in a 65 nm technology.