2009
DOI: 10.1145/1502781.1502786
|View full text |Cite
|
Sign up to set email alerts
|

Techniques for Design and Implementation of Secure Reconfigurable PUFs

Abstract: Physically unclonable functions (PUFs) provide a basis for many security and digital rights management protocols. PUF-based security approaches have numerous comparative strengths with respect to traditional cryptography-based techniques, including resilience against physical and side channel attacks and suitability for lightweight protocols. However, classical delay-based PUF structures have a number of drawbacks including susceptibility to guessing, reverse engineering, and emulation attacks, as well as sens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

4
127
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 176 publications
(131 citation statements)
references
References 42 publications
4
127
0
Order By: Relevance
“…31 The method proposed by Majzoobi, Koushanfar, and Potkonjak safeguards the PUFs by using an input network that avoids individual controlling of the challenges, and an XOR output network that compresses the responses so that they cannot be reverseengineered. 32 Even though attempts have been made to break this type of safeguard, no polynomial method for learning the PUF with an XOR output network has been reported thus far. To ensure attack resiliency, Majzoobi, Koushanfar, and Potkonjak proposed five tests: predictability, collision, sensitivity, reverse engineering, and emulation.…”
Section: Design For Hardware Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…31 The method proposed by Majzoobi, Koushanfar, and Potkonjak safeguards the PUFs by using an input network that avoids individual controlling of the challenges, and an XOR output network that compresses the responses so that they cannot be reverseengineered. 32 Even though attempts have been made to break this type of safeguard, no polynomial method for learning the PUF with an XOR output network has been reported thus far. To ensure attack resiliency, Majzoobi, Koushanfar, and Potkonjak proposed five tests: predictability, collision, sensitivity, reverse engineering, and emulation.…”
Section: Design For Hardware Trustmentioning
confidence: 99%
“…To ensure attack resiliency, Majzoobi, Koushanfar, and Potkonjak proposed five tests: predictability, collision, sensitivity, reverse engineering, and emulation. 32 The predictability test identifies the level of difficulty of correctly calculating or predicting PUF or random-ID outputs for a given input. The collision test studies whether two different inputs can map to the same output.…”
Section: Design For Hardware Trustmentioning
confidence: 99%
“…The mapping is such that only the system owner can quickly get the correct responses and calculating output within a reasonable time by another person is very hard [6].…”
Section: Physical Unclonable Functions As An Anti-cloning Solutionmentioning
confidence: 99%
“…Security techniques that use silicon PUFs have many benefits compared to other techniques. Among them we can address great resistance against reverse engineering techniques, covert channel resistance and a higher response rate [6]. Therefore, in this paper we will focus on intrinsic silicon PUFs.…”
Section: Physical Unclonable Functions As An Anti-cloning Solutionmentioning
confidence: 99%
See 1 more Smart Citation