Abstract. This paper presents a lightweight anti-counterfeiting solution using intrinsic Physically Unclonable Functions (PUFs), which are al-ready embedded in most commodity hardware platforms. The presented solution is particularly suitable for low-end computing devices without on-board security features. Our anti-counterfeiting approach is based on extracting a unique fingerprint for individual devices exploiting inher-ent PUF characteristics from the on-chip static random-access memory (SRAM), which in turn allows to bind software to a particular hardware platform. Our solution does not require additional hardware, making it flexible as well as cost efficient. In a first step, we statistically analyze the characteristics of the intrinsi...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Physically Unclonable Functions are a promising tool to protect against counterfeiting attacks. Yet,...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Globalization of semiconductor supply/design chain has led to several hardware security problems. Th...
An emerging technology known as Physical unclonable function (PUF) can provide a hardware root-of-tr...
Abstract — The rapidly rising incidences of counterfeit Inte-grated Circuits (ICs) in the semiconduc...
Electronics hardware is subject to a number of potential threats such as reverse engineering and cou...
Novel manufacturing technologies, such as printed electronics, may enable future applications for th...
Abstract. Intrinsic Physical Unclonable Functions or PUFs have been introduced as a highly secure me...
The continued growth of information technology (IT) industry and proliferation of interconnected dev...
As integrated circuit (IC) designs become more and more complex, the globalization of the IC supply ...
Security is becoming an increasing concern in electronic devices recently. Specifically, since the e...
Building lightweight security for low-cost pervasivedevices is a major challenge considering the des...
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of ...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Physically Unclonable Functions are a promising tool to protect against counterfeiting attacks. Yet,...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Globalization of semiconductor supply/design chain has led to several hardware security problems. Th...
An emerging technology known as Physical unclonable function (PUF) can provide a hardware root-of-tr...
Abstract — The rapidly rising incidences of counterfeit Inte-grated Circuits (ICs) in the semiconduc...
Electronics hardware is subject to a number of potential threats such as reverse engineering and cou...
Novel manufacturing technologies, such as printed electronics, may enable future applications for th...
Abstract. Intrinsic Physical Unclonable Functions or PUFs have been introduced as a highly secure me...
The continued growth of information technology (IT) industry and proliferation of interconnected dev...
As integrated circuit (IC) designs become more and more complex, the globalization of the IC supply ...
Security is becoming an increasing concern in electronic devices recently. Specifically, since the e...
Building lightweight security for low-cost pervasivedevices is a major challenge considering the des...
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of ...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Physically Unclonable Functions are a promising tool to protect against counterfeiting attacks. Yet,...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...