In this paper we investigate several potential hardware features from multiple devices for suitability during the employment of a device identification. The generation of stable and unique digital identity from features is challenging in device identification because of the unstable operation environments that implies the features employed are likely to vary under normal operating conditions. To address this, we introduce a novel multi-dimensional key generation technology which maps from multi-dimensional feature space directly to a key space. Furthermore, normalized distributions of features give the necessary data to model the characteristics, from which we derive intra-sample device feature distributions, and correlate the distinct feat...
Field Programmable Gate Arrays (FPGAs) are being used for military and other sensitive applications,...
Most software applications rely on the use of user-name and passwords to authenticate end users. Thi...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
This paper investigates the use of novel hardware features derived from the physical and behavioral ...
This paper presents a novel technique, termed ICmetrics (Integrated Circuit metrics), that can be us...
This paper investigates the use of system memory featuresas the characteristics of simpler embedded ...
Cryptographic algorithms have always relied on stored keys for the provision of security services. S...
Protecting hardware devices from unwanted software attacks is a current area of major security conce...
The ICmetrics technology is concerned with identifying acceptable features in an electronic system's...
Unique identification of devices brings new security challenges to privacy issues in intelligent mul...
The Integrated Circuit Metric (ICMetric) technology is a novel trust basis that uses the system feat...
The Integrated Circuit Metric (ICMetric) technology is a novel trust basis that uses the system feat...
This paper investigates the effectiveness of employing measured hardware features mapped into the fr...
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of s...
Device identification, as human identification has been, has become critical to mitigate growing sec...
Field Programmable Gate Arrays (FPGAs) are being used for military and other sensitive applications,...
Most software applications rely on the use of user-name and passwords to authenticate end users. Thi...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
This paper investigates the use of novel hardware features derived from the physical and behavioral ...
This paper presents a novel technique, termed ICmetrics (Integrated Circuit metrics), that can be us...
This paper investigates the use of system memory featuresas the characteristics of simpler embedded ...
Cryptographic algorithms have always relied on stored keys for the provision of security services. S...
Protecting hardware devices from unwanted software attacks is a current area of major security conce...
The ICmetrics technology is concerned with identifying acceptable features in an electronic system's...
Unique identification of devices brings new security challenges to privacy issues in intelligent mul...
The Integrated Circuit Metric (ICMetric) technology is a novel trust basis that uses the system feat...
The Integrated Circuit Metric (ICMetric) technology is a novel trust basis that uses the system feat...
This paper investigates the effectiveness of employing measured hardware features mapped into the fr...
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of s...
Device identification, as human identification has been, has become critical to mitigate growing sec...
Field Programmable Gate Arrays (FPGAs) are being used for military and other sensitive applications,...
Most software applications rely on the use of user-name and passwords to authenticate end users. Thi...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...