We describe a technique to reliably identify individual inte-grated circuits (ICs), based on a prior delay characterization of the IC. We describe a circuit architecture for a key card for which authentication is delay based, rather than based on a digital secret key. We argue that key cards built in this fashion are resistant to many known kinds of attacks. Since the delay of ICs can vary with environmental condi-tions such as temperature, we develop compensation schemes and show experimentally that reliable authentication can be performed in the presence of significant environmental vari-ations. The delay information that is extracted from the IC can also be used to generate keys for use in classical crypto-graphic primitives. Application...
Electronics hardware is subject to a number of potential threats such as reverse engineering and cou...
(IP) core or to inject malicious alterations is a major concern. First, offshore chip manufac-turing...
Microelectronic security devices are more and more present in our lives (smartcards, SIM cards) and ...
International audienceSecurity of cryptographic circuits is a major concern. Fault attacks are a mea...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
As integrated circuit (IC) designs become more and more complex, the globalization of the IC supply ...
This paper des ribes a te hnique to reliably and se urely identify individual integrated ir uits (IC...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
The integrated circuit (IC) development process is becoming increasingly vulnerable to malicious act...
The counterfeiting of integrated circuits (ICs) has become a major issue for the electronics industr...
Secure systems require strong encryption and authentication protocols. Secure systems are used are c...
We describe the notion of a Physical Random Function (PUF). We argue that a complex integrated circu...
Abstract — The rapidly rising incidences of counterfeit Inte-grated Circuits (ICs) in the semiconduc...
International audienceIntegrated Circuits (IC) are increasingly present in our daily lives through v...
The types of physical attacks on smart grid devices range from simple approaches, such as exploiting...
Electronics hardware is subject to a number of potential threats such as reverse engineering and cou...
(IP) core or to inject malicious alterations is a major concern. First, offshore chip manufac-turing...
Microelectronic security devices are more and more present in our lives (smartcards, SIM cards) and ...
International audienceSecurity of cryptographic circuits is a major concern. Fault attacks are a mea...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
As integrated circuit (IC) designs become more and more complex, the globalization of the IC supply ...
This paper des ribes a te hnique to reliably and se urely identify individual integrated ir uits (IC...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
The integrated circuit (IC) development process is becoming increasingly vulnerable to malicious act...
The counterfeiting of integrated circuits (ICs) has become a major issue for the electronics industr...
Secure systems require strong encryption and authentication protocols. Secure systems are used are c...
We describe the notion of a Physical Random Function (PUF). We argue that a complex integrated circu...
Abstract — The rapidly rising incidences of counterfeit Inte-grated Circuits (ICs) in the semiconduc...
International audienceIntegrated Circuits (IC) are increasingly present in our daily lives through v...
The types of physical attacks on smart grid devices range from simple approaches, such as exploiting...
Electronics hardware is subject to a number of potential threats such as reverse engineering and cou...
(IP) core or to inject malicious alterations is a major concern. First, offshore chip manufac-turing...
Microelectronic security devices are more and more present in our lives (smartcards, SIM cards) and ...