Academic
Publications
Silicon physical random functions

Silicon physical random functions,10.1145/586110.586132,Blaise Gassend,Dwaine E. Clarke,Marten Van Dijk,Srinivas Devadas

Silicon physical random functions   (Citations: 126)
BibTex | RIS | RefWorks Download
We introduce the notion of a Physical Random Function (PUF). We argue that a complex integrated circuit can be viewed as a silicon PUF and describe a technique to identify and authenticate individual integrated circuits (ICs).We describe several possible circuit realizations of different PUFs. These circuits have been implemented in commodity Field Programmable Gate Arrays (FPGAs). We present experiments which indicate that reliable authentication of individual FPGAs can be performed even in the presence of significant environmental variations.We describe how secure smart cards can be built, and also briefly describe how PUFs can be applied to licensing and certification applications.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...Later it was observed that the linear arbiter-based PUF is vulnerable to modelling attacks, and the nonlinear feed-forward arbiters and hashing were proposed to protect against this attack (Gassend, Clarke, Dijk, and Devadas 2002)...

    Yuejun Zhanget al. Model and physical implementation of multi-port PUF in 65 nm CMOS

    • ...A physically one-way function [4][5][6], whose silicon implementation is better known as a physically unclonable function (PUF), is a different type of hardware authentication approach...
    • ...Gassend et al. [4] introduced delay-based silicon PUFs that leverage the intrinsic PV of deep submicron technologies, where a set of challenge-response pairs are used to perform authentication tasks...

    Miodrag Potkonjaket al. Differential public physically unclonable functions: Architecture and ...

    • ...The physically unclonable function (PUF) emerged in the last decade as the security primitive of choice due to its low power, high speed, and (most importantly) resiliency to side-channel, physical, and software attacks [1][2][3][4]...

    Saro Meguerdichianet al. Device aging-based physically unclonable functions

    • ...The security primitive of a Physical Unclonable Function (PUF) [8] [9] [10] [11] was introduced, at least in part, in order to address some of the above problems...
    • ...One prominent example are PUF-based identification schemes [8] [9] [10]...

    Ulrich Rührmair. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret...

    • ...Physical unclonable functions (PUFs) are efficient mechanisms for many security applications [1], [2]...
    • ...They proposed the arbiter-based PUF architecture based on the variations in CMOS logic delays [2]...
    • ...The arbiter-based PUF implementation on ASICs was demonstrated, and a number of attacks and countermeasures were discussed [2], [8], [9], [6], [10]...
    • ...In particular, it was observed that the linear arbiter-based PUF is vulnerable to modeling attacks and the use of nonlinear feed-forward arbiters and hashing were proposed to safeguard against this attack [2]...
    • ...the protocol. However, accepting some errors in the responses makes the verifier more susceptible to emulation/impersonating attacks [2], [25]...

    Mehrdad Majzoobiet al. Time-Bounded Authentication of FPGAs

Sort by: