We present a side-channel attack based on remanence decay in volatile memory and show how it can be exploited effectively to launch a non-invasive cloning attack against SRAM PUFs — an important class of PUFs typically proposed as lightweight security primitives which use existing memory on the underlying device. We validate our approach using SRAM PUFs instantiated on two 65nm CMOS devices. We discuss countermeasures against our attack and propose the constructive use of remanence decay to improve the cloning-resistance of SRAM PUFs. Moreover, as a further contribution of independent interest, we show how to use our evaluation results to significantly improve the performance of the recently proposed TARDIS scheme, which is based on remanen...
A Physically Unclonable Function (PUF) is an entity that reliably provides a unique response to a gi...
Physical Unclonable Functions (PUFs) have emerged as an attractive primitive to address diverse hard...
In the era of internet of things, electronic devices are becoming ubiquitous. To perform secure task...
Abstract. We present a side-channel attack based on remanence de-cay in volatile memory and show how...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
Research in hardware security, particularly on Physical Unclonable Functions (PUF) has attracted a l...
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of ...
The Internet of Things (IoTs) employs resource-constrained sensor nodes for sensing and processing d...
An SRAM Physical Unclonable Function (SRAM-PUF) is a potential solution for lightweight secure key g...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
Physical unclonable functions (PUFs) are relatively new security primitives used for device authenti...
Physically unclonable functions (PUFs) have been touted for their inherent resistance to invasive at...
A Physically Unclonable Function (PUF) is an entity that reliably provides a unique response to a gi...
Physical Unclonable Functions (PUFs) have emerged as an attractive primitive to address diverse hard...
In the era of internet of things, electronic devices are becoming ubiquitous. To perform secure task...
Abstract. We present a side-channel attack based on remanence de-cay in volatile memory and show how...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
Research in hardware security, particularly on Physical Unclonable Functions (PUF) has attracted a l...
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of ...
The Internet of Things (IoTs) employs resource-constrained sensor nodes for sensing and processing d...
An SRAM Physical Unclonable Function (SRAM-PUF) is a potential solution for lightweight secure key g...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
Physical unclonable functions (PUFs) are relatively new security primitives used for device authenti...
Physically unclonable functions (PUFs) have been touted for their inherent resistance to invasive at...
A Physically Unclonable Function (PUF) is an entity that reliably provides a unique response to a gi...
Physical Unclonable Functions (PUFs) have emerged as an attractive primitive to address diverse hard...
In the era of internet of things, electronic devices are becoming ubiquitous. To perform secure task...