A Modeling Attack Resistant Scheme Based on Fault Injection
暂无分享,去创建一个
[1] Srinivas Devadas,et al. Controlled physical random functions and applications , 2008, TSEC.
[2] Jan Sölter,et al. PUF modeling attacks: An introduction and overview , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[3] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[4] Masaya Yoshikawa,et al. Multiplexing aware arbiter physical unclonable function , 2012, 2012 IEEE 13th International Conference on Information Reuse & Integration (IRI).
[5] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[6] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[7] G. Edward Suh,et al. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations , 2011, TRUST.
[8] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, ICCAD 2008.
[9] Mitsugu Iwamoto,et al. A New Arbiter PUF for Enhancing Unpredictability on FPGA , 2015, TheScientificWorldJournal.
[10] Mark Zwolinski,et al. Lightweight obfuscation techniques for modeling attacks resistant PUFs , 2017, 2017 IEEE 2nd International Verification and Security Workshop (IVSW).
[11] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[12] Srinivas Devadas,et al. Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching , 2014, IEEE Transactions on Emerging Topics in Computing.
[13] Subramanian S. Iyer,et al. A Self-Authenticating Chip Architecture Using an Intrinsic Fingerprint of Embedded DRAM , 2013, IEEE Journal of Solid-State Circuits.
[14] Derek Abbott,et al. Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[15] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[16] Ulrich Rührmair,et al. PUFs at a glance , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[17] Pim Tuyls. Hardware Intrinsic Security , 2010, RFIDSec.
[18] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[19] Akashi Satoh,et al. Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs , 2010, 2010 International Conference on Reconfigurable Computing and FPGAs.
[20] Ahmad-Reza Sadeghi,et al. Memristor PUFs: A new generation of memory-based Physically Unclonable Functions , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).