Memory-Based Combination PUFs for Device Authentication in Embedded Systems
暂无分享,去创建一个
[1] Stefan Katzenbeisser,et al. An Overview of DRAM-Based Security Primitives , 2018, Cryptogr..
[2] Wolfgang Pribyl,et al. A microcontroller SRAM-PUF , 2011, 2011 5th International Conference on Network and System Security.
[3] Nima Karimian,et al. DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[4] Arnab Raha,et al. Quality Configurable Approximate DRAM , 2017, IEEE Transactions on Computers.
[5] James F. Plusquellic,et al. A non-volatile memory based physically unclonable function without helper data , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[6] Daniel E. Holcomb,et al. Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM , 2014, IACR Cryptol. ePrint Arch..
[7] Arnab Raha,et al. D-PUF: An intrinsically reconfigurable DRAM PUF for device authentication in embedded systems , 2016, 2016 International Conference on Compliers, Architectures, and Sythesis of Embedded Systems (CASES).
[8] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[9] M. Pecht,et al. Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics , 2006, IEEE Spectrum.
[10] Vincent van der Leest,et al. Logically reconfigurable PUFs: memory-based secure key storage , 2011, STC '11.
[11] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[12] Arnab Raha,et al. Energy-efficient system design for IoT devices , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[13] Onur Mutlu,et al. The DRAM Latency PUF: Quickly Evaluating Physical Unclonable Functions by Exploiting the Latency-Reliability Tradeoff in Modern Commodity DRAM Devices , 2018, 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA).
[14] Swarup Bhunia,et al. MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array , 2011, CHES.
[15] Jean-Pierre Seifert,et al. Cloning Physically Unclonable Functions , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[16] James F. Plusquellic,et al. Current based PUF exploiting random variations in SRAM cells , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[17] Ahmad-Reza Sadeghi,et al. Reconfigurable Physical Unclonable Functions - Enabling technology for tamper-resistant storage , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[18] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[19] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[20] Song Liu,et al. Flikker: saving DRAM refresh-power through critical data partitioning , 2011, ASPLOS XVI.
[21] G. Edward Suh,et al. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations , 2011, TRUST.
[22] Stefan Katzenbeisser,et al. Run-Time Accessible DRAM PUFs in Commodity Devices , 2016, CHES.
[23] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[24] Radu Teodorescu,et al. Authenticache: Harnessing cache ECC for system authentication , 2015, 2015 48th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[25] G. Edward Suh,et al. Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints , 2012, 2012 IEEE Symposium on Security and Privacy.
[26] Onur Mutlu,et al. Understanding Reduced-Voltage Operation in Modern DRAM Devices , 2017, Proc. ACM Meas. Anal. Comput. Syst..
[27] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[28] Igor L. Markov,et al. SuperPUF: Integrating heterogeneous Physically Unclonable Functions , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[29] Boris Skoric,et al. Bias-based modeling and entropy analysis of PUFs , 2013, TrustED '13.
[30] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[31] Arnab Raha,et al. Quality-aware data allocation in approximate DRAM* , 2015, 2015 International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES).
[32] Abhranil Maiti,et al. The Impact of Aging on a Physical Unclonable Function , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[33] James F. Plusquellic,et al. PUF-based authentication , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[34] Hubert Kaeslin,et al. Dynamic memory-based physically unclonable function for the generation of unique identifiers and true random numbers , 2014, 2014 IEEE International Symposium on Circuits and Systems (ISCAS).
[35] Stefan Katzenbeisser,et al. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon , 2012, CHES.
[36] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.