2017 International Carnahan Conference on Security Technology (ICCST) 2017
DOI: 10.1109/ccst.2017.8167796
|View full text |Cite
|
Sign up to set email alerts
|

Unique signatures from printed circuit board design patterns and surface mount passives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Reliability can be measured by the Bit Error Rate (BER), which is the probability of error in the responses of the same PUF circuit for different environments under the same challenge [28], and is calculated as shown in Eq. (11).…”
Section: Performance Of Cpr Puf Responses (1) Reliabilitymentioning
confidence: 99%
“…Reliability can be measured by the Bit Error Rate (BER), which is the probability of error in the responses of the same PUF circuit for different environments under the same challenge [28], and is calculated as shown in Eq. (11).…”
Section: Performance Of Cpr Puf Responses (1) Reliabilitymentioning
confidence: 99%
“…PCB-level Fingerprint: Authentication service providers generate a unique fingerprint for each PCB [17][18][19] based on the unique characteristics of PCB, such as process variations of the path delay between PCB boundary scan cells [20], the intrinsic trace impedance [21,22], and the impedance at resonance [23,24]. [25] presents a PCB-level radio frequency identification (RFID) based counterfeit detection technique, which employs a RFID tag to collect and transmit the Physical Unclonable Function (PUF [26]) and on-chip sensors' values of all ICs on PCB.…”
Section: Introductionmentioning
confidence: 99%
“…The tested PCB can be considered as counterfeit one, if its fingerprint does not match the database or the value has changed. However, most existing countermeasures require additional equipments to measure key parameters [21][22][23][24] or modify the PCB [25], which result in high test and area overhead. Furthermore, dependence on external equipments prevents secure remote authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, designs have been proposed that analyze variations within passive components [20], debug components [21], or a combination of passives that define a filter structure [22]. While surface mount components are plentiful on any modern PCB design, measuring each individual component to create a unique identifier becomes impractical and costly.…”
Section: Introductionmentioning
confidence: 99%
“…The variations that exist within copper traces have been used as the foundation of unique identifiers [20,[23][24][25]. These techniques measure variations in single and double layer copper traces that are replicated across the PCB at different locations [20,23]. Double layer copper traces are constructed as transmission lines and used with several PCB elements to check the integrity of the PCB.…”
Section: Introductionmentioning
confidence: 99%