[go: up one dir, main page]

Hussain et al., 2014 - Google Patents

BIST-PUF: Online, hardware-based evaluation of physically unclonable circuit identifiers

Hussain et al., 2014

View PDF
Document ID
18298857399479667521
Author
Hussain S
Yellapantula S
Majzoobi M
Koushanfar F
Publication year
Publication venue
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)

External Links

Snippet

Physical Unclonable Functions (PUF) are of increasing importance due to their many hardware security applications including chip fingerprinting, metering, authentication, anti- counterfeiting, and supply-chain tracing, eg, DARPA SHIELD. This paper presents BIST …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Hussain et al. BIST-PUF: Online, hardware-based evaluation of physically unclonable circuit identifiers
JP6608457B2 (en) A method for generating physically unclonable function bitstreams with improved reliability
US8370787B2 (en) Testing security of mapping functions
Hussain et al. A built-in-self-test scheme for online evaluation of physical unclonable functions and true random number generators
Mahalat et al. Implementation, characterization and application of path changing switch based arbiter PUF on FPGA as a lightweight security primitive for IoT
Duvalsaint et al. Characterization of locked combinational circuits via ATPG
Ju et al. Stability analysis of a physical unclonable function based on metal resistance variations
KR20220041048A (en) Systems and methods for using hybrid boolean networks as functions that cannot be physically replicated
Sauer et al. Sensitized path PUF: A lightweight embedded physical unclonable function
Tehranipoor et al. DVFT: A lightweight solution for power-supply noise-based TRNG using dynamic voltage feedback tuning system
Yu et al. Can deep learning break a true random number generator?
Gai et al. Attacking the edge-of-things: A physical attack perspective
Liberty et al. True hardware random number generation implemented in the 32-nm SOI POWER7+ processor
Kareem et al. Physical unclonable functions based hardware obfuscation techniques: A state of the art
Mills et al. Design and evaluation of a delay-based FPGA physically unclonable function
Chatterjee et al. Systematically quantifying cryptanalytic nonlinearities in strong PUFs
Tehranipoor et al. Hardware Security Training, Hands-on!
Kasarabada et al. Sled: Sequential logic encryption using dynamic keys
Sivaraman et al. Security in sequence: NIST-adherent design of a hybrid random number generator with SRAM-based PUF
Paul et al. Curias: Current-based ic authentication by exploiting supply current variations
Xu et al. Post-silicon validation and calibration of hardware security primitives
Gutierrez et al. Physical unclonable functions (pufs): Foundations, evaluation, and testing for secure hardware systems
Chakraborty et al. Combined side-channel and fault analysis attack on protected grain family of stream ciphers
Hussain et al. BIST for Online Evaluation of PUFs and TRNGs
Tebelmann Side-Channel Analysis and Countermeasures for Physical Unclonable Functions