2012 IEEE Computer Society Annual Symposium on VLSI 2012
DOI: 10.1109/isvlsi.2012.40
|View full text |Cite
|
Sign up to set email alerts
|

Nano-PPUF: A Memristor-Based Security Primitive

Abstract: Abstract-CMOS devices have been used to build hardware security primitives such as physical unclonable functions. Since CMOS devices are relatively easy to model and simulate, CMOS-based security primitives are increasingly prone to modeling attacks. We propose memristor-based Public Physical Unclonable Functions (nano-PPUFs); they have complex models that are difficult to simulate. We leverage sneak path currents, process variations, and computationally intensive SPICE models as features to build the nano-PPU… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
88
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 91 publications
(88 citation statements)
references
References 18 publications
0
88
0
Order By: Relevance
“…Utilizing nanotechnologies for PUFs has been proposed recently [15] [16]. We progress this research by simulating our design and demonstrating its resilience to security attacks.…”
Section: B Nanotechnologymentioning
confidence: 97%
“…Utilizing nanotechnologies for PUFs has been proposed recently [15] [16]. We progress this research by simulating our design and demonstrating its resilience to security attacks.…”
Section: B Nanotechnologymentioning
confidence: 97%
“…shorter pulse widths and lower voltage amplitudes, are analyzed for the generation of random bits. The crossbar array was leveraged to build a public PUF (PPUF) in [14].…”
Section: Rrams For Hardware Intrinsic Securitymentioning
confidence: 99%
“…In security this problem can be overcome by specifying a communication time window that is enough for the receiver to adjust the wrong bits of the key while it is not sufficient for the attacker to guess the key. 13 In order to increase the efficiency of the approach proposed in this work, we suggest to overcome the AIP Advances 6, 025107 (2016) impact of the process variations by extracting the keys using the shared area under the generated profiles (see shaded area in Fig. 9).…”
Section: B Impact Of Process Variationsmentioning
confidence: 99%
“…[12][13][14][15][16][17][18] • Provide perfect security via the key size, which can be tuned to match the message length.…”
Section: Introductionmentioning
confidence: 99%