2016
DOI: 10.1007/978-3-319-29485-8_16
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Unified Security Model for Physically Unclonable Functions

Abstract: The use of Physically Unclonable Functions (PUFs) in cryptographic protocols attracted an increased interest over recent years. Since sound security analysis requires a concise specification of the alleged properties of the PUF, there have been numerous trials to provide formal security models for PUFs. However, all these approaches have been tailored to specific types of applications or specific PUF instantiations. For the sake of applicability, composability, and comparability, however, there is a strong nee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(48 citation statements)
references
References 30 publications
0
48
0
Order By: Relevance
“…The emerging areas like Physical Unclonable Functions (PUFs) can be adopted to enhance the security level of security in IoT [285]. PUFs are functions that generate unique identifiers for the devices by using dedicated secure processors during the manufacturing phase, and often, these identifiers are used to generate secure secret keys and key management [286].…”
Section: ) Hardware Securitymentioning
confidence: 99%
“…The emerging areas like Physical Unclonable Functions (PUFs) can be adopted to enhance the security level of security in IoT [285]. PUFs are functions that generate unique identifiers for the devices by using dedicated secure processors during the manufacturing phase, and often, these identifiers are used to generate secure secret keys and key management [286].…”
Section: ) Hardware Securitymentioning
confidence: 99%
“…Note that elaborate and formal definitions as well as formalizations of PUFs are beyond the scope of this work, and for more details, the reader is referred to [8,9]. In general, PUFs are physical input to output mappings, which map given challenges to responses.…”
Section: Pufsmentioning
confidence: 99%
“…PUF realizations are based on one of a variety of physical principles including: a) random process variation of silicon chip production e.g. unique time-delay based variations, bistable memory elements and the resulting random state variation ("memory based"), and mixed-signal including an analog-to-digital conversion quantization; b) optically based speckle pattern from laser interaction with randomly distributed scattering particles; c) electromagnetic based capacitance between silicon chip twin-wires where the chip surface having a randomly distributed layer of dielectric particles ("coating PUF") [51,52].…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
“…The above and Section 8.4 including Subsection 8.4.1, are together strong arguments for the potential of OVD based PUFs. The reader interested to further evaluate the soundness of these claims may found literature on unified security models for PUFs [52] and in-depth evaluation procedures [51], both to facilitate generic (nonspecific) analysis of PUFs, of relevance. Also, an ISO working draft (IEC NP 20897) may also be or become of relevance.…”
Section: Physically Unclonable Functionmentioning
confidence: 99%