Abstract. We present a side-channel attack based on remanence de-cay in volatile memory and show how it can be exploited effectively to launch a non-invasive cloning attack against SRAM PUFs — an impor-tant class of PUFs typically proposed as lightweight security primitive with low overhead by using the existing memory of the underlying device. We validate our approach against two SRAM PUF implementations in 65 nm CMOS ASICs. We discuss countermeasures against our attack and propose the constructive use of remanence decay to improve the cloning-resistance of SRAM PUFs. Moreover, as a further contribution of independent interest, we show how to use our evaluation results to significantly improve the performance of the recently proposed TARDI...
When the internet of things becomes the trend of development, our lives become more convenient with ...
Physical unclonable functions (PUFs) are relatively new security primitives used for device authenti...
The utilization of power-up values in SRAM cells to generate PUF responses for chip identification i...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
Research in hardware security, particularly on Physical Unclonable Functions (PUF) has attracted a l...
The Internet of Things (IoTs) employs resource-constrained sensor nodes for sensing and processing d...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
Physically unclonable functions (PUFs) have been touted for their inherent resistance to invasive at...
A Physically Unclonable Function (PUF) is an entity that reliably provides a unique response to a gi...
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of ...
Physical Unclonable Functions (PUFs) have emerged as an attractive primitive to address diverse hard...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
In the era of internet of things, electronic devices are becoming ubiquitous. To perform secure task...
When the internet of things becomes the trend of development, our lives become more convenient with ...
Physical unclonable functions (PUFs) are relatively new security primitives used for device authenti...
The utilization of power-up values in SRAM cells to generate PUF responses for chip identification i...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
Research in hardware security, particularly on Physical Unclonable Functions (PUF) has attracted a l...
The Internet of Things (IoTs) employs resource-constrained sensor nodes for sensing and processing d...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
Physically unclonable functions (PUFs) have been touted for their inherent resistance to invasive at...
A Physically Unclonable Function (PUF) is an entity that reliably provides a unique response to a gi...
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of ...
Physical Unclonable Functions (PUFs) have emerged as an attractive primitive to address diverse hard...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
In the era of internet of things, electronic devices are becoming ubiquitous. To perform secure task...
When the internet of things becomes the trend of development, our lives become more convenient with ...
Physical unclonable functions (PUFs) are relatively new security primitives used for device authenti...
The utilization of power-up values in SRAM cells to generate PUF responses for chip identification i...