2022
DOI: 10.3389/fnano.2022.1055545
|View full text |Cite
|
Sign up to set email alerts
|

Tamper-sensitive pre-formed ReRAM-based PUFs: Methods and experimental validation

Abstract: In this paper, we present the characterization of pre-formed resistive random access memories to design physical unclonable functions and experimentally validate inherent properties such as tamper sensitivity and a self-destroy mode. The physical unclonable functions were tested for repetitive use, temperature effects, and aging. The variations during successive response generation cycles and drift rates are quantized to explore their reliability. We define tamper-sensitivity as the ability to detect tampering… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…Testing shall be done to bring this new PUF design in compliance with NIST's qualifications of randomness. An additional layer of security can be added to this PUF through advancement of our tamper sensitivity methods, highlighted in the work of Wilson et al 16 We prescribe building a real-world implementation using the work of Wright et al 24 Their work presents an RBC error-correcting engine (see Section 2.3), which instead of sending the hash of the key to the CA, would only require that the public key is sent to the CA in order for the CA to correct for error. This is an excellent enhancement since it eliminates the transfer of sensitive information over the network, even if that sensitive information is hashed.…”
Section: Future Workmentioning
confidence: 99%
“…Testing shall be done to bring this new PUF design in compliance with NIST's qualifications of randomness. An additional layer of security can be added to this PUF through advancement of our tamper sensitivity methods, highlighted in the work of Wilson et al 16 We prescribe building a real-world implementation using the work of Wright et al 24 Their work presents an RBC error-correcting engine (see Section 2.3), which instead of sending the hash of the key to the CA, would only require that the public key is sent to the CA in order for the CA to correct for error. This is an excellent enhancement since it eliminates the transfer of sensitive information over the network, even if that sensitive information is hashed.…”
Section: Future Workmentioning
confidence: 99%