Most IoT products or their constituent elements such as chips are vulnerable to various types of security attack, such as side channel attacks and physical cloning attacks. [2][3][4] Stored or processed information can be exposed to a hacker via timing analysis, [5] power analysis, [6] electromagnetic radiation analysis, [7] data remanence analysis, [8] etc.There are several kinds of security methods, such as embedded security element, [9] trusted platform module, [10] and true random number generator, [11,12] have been proposed to improve security and save power consumption of IoT devices. Alternatively, a physical unclonable function (PUF) device has also attracted considerable attention to address the aforementioned shortcomings. [13][14][15][16] The PUF should be unpredictable, irreproducible, and statistically unbiased, based on inherent randomness derived from the unavoidable variability that occurs during device fabrication. A PUF in a chip can be analogous to a fingerprint or an iris in a human. With these features, the PUF generates distinctive challenge/response pairs to allow security functions such as authentication and key storage. And it can also be used for anti-counterfeiting integrated circuits, protecting intellectual property, and software licensing. [17] To implement an ideal PUF, two essential conditions should be satisfied: 1) it must be easy to create randomness but impossible to predict it, and 2) it must be easy to make a PUF device but difficult to duplicate it.PUF devices can be categorized into roughly three groupscircuit-based PUF, memory-based PUF and the other types including micro-electro-mechanical-system (MEMS) PUF, and optical PUF. The circuit-based PUF such as arbiter PUF, [18] ring oscillator (RO) PUF, [19] and glitch PUF, [20] primarily used a delay time as a representative metric. The memorybased PUF, including static random access memory (SRAM) PUF, [21,22] flash memory PUF, [23,24] RRAM PUF, [25,26] DRAM PUF [27,28] used device-to-device variations arisen from microfabrication [29][30][31][32] as the typical variables. A few representatives are the variations of on-state current, threshold voltage, retention time, etc.With the advance of internet of things, numerous electronic devices are being connected to each other through the internet. As the number of connections has increased, security has become increasingly important. Physically unclonable function (PUF) is one of the essential approaches that can be used to secure data in device. In this work, an independently controlled double-gate (ICDG) transistor composed of a poly-crystalline silicon (poly-Si) nanowire channel for PUF is first demonstrated. Simply fabricated using CMOS processes, the so-called PUF transistor harnesses multi-states and self-destruction for advanced security. The randomness in the poly-Si nanowire channel is established by the randomly distributed poly-Si grains. This random distribution means each transistor has a different threshold voltage (V th ). Moreover, multi-states composed of a primar...