2017
DOI: 10.1145/3094414
|View full text |Cite
|
Sign up to set email alerts
|

Design Considerations for Memristive Crossbar Physical Unclonable Functions

Abstract: Hardware security has emerged as a field concerned with issues such as integrated circuit (IC) counterfeiting, cloning, piracy, and reverse engineering. Physical unclonable functions (PUF) are hardware security primitives useful for mitigating such issues by providing hardware-specific fingerprints based on intrinsic process variations within individual IC implementations. As technology scaling progresses further into the nanometer region, emerging nanoelectronic technologies, such as memristors or RRAMs (resi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
17
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 34 publications
0
17
0
Order By: Relevance
“…Later in [17] the Xbar PUF performance evaluation was done with slight improvement in the design using bipolar resistive switching of memristors and a 2-D crossbar array was proposed. The design was further improved in [18] by adding nonlinearities in the response by incorporating column swapping technique in the Xbar and processing the output through exclusive OR gate (XORing). The comparative performance evaluation and resistance to ML attacks like Logistic Regression (LR) and Support Vector Machine (SVM) was done in [19].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Later in [17] the Xbar PUF performance evaluation was done with slight improvement in the design using bipolar resistive switching of memristors and a 2-D crossbar array was proposed. The design was further improved in [18] by adding nonlinearities in the response by incorporating column swapping technique in the Xbar and processing the output through exclusive OR gate (XORing). The comparative performance evaluation and resistance to ML attacks like Logistic Regression (LR) and Support Vector Machine (SVM) was done in [19].…”
Section: Introductionmentioning
confidence: 99%
“…The comparative performance evaluation and resistance to ML attacks like Logistic Regression (LR) and Support Vector Machine (SVM) was done in [19]. All of the above PUF architectures were based on delay based arbiter PUF [18]. A general framework of logical and filter based approximation attacks on Arbiter PUFs is discussed in [20].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations