- Becker, G. The gap between promise and reality: On the insecurity of XOR arbiter PUFs. International Workshop on Cryptographic Hardware and Embedded Systems (2015), 535--555.Google ScholarCross Ref
- Boneh, D., Joux, A. and Nguyen, P. Why textbook elgamal and RSA encryption are insecure. Advances in Cryptology (2000), 30--43. Google ScholarDigital Library
- Counterfeiting and piracy: stamping it out. The Economist. April 23, 2016.Google Scholar
- Delvaux, J., Peeters, R., Gu, D. and Verbauwhede, I. A survey on entity authentication with strong PUFs. ACM Computing Surveys 48, 2 (2015), 26:1--26:42. Google ScholarDigital Library
- Ganji, F., Tajik, S. and Seifert, J.-P. Why attackers win: on the learnability of XOR arbiter PUFs. International Conference on Trust and Trustworthy Computing (2015), 22--39.Google ScholarCross Ref
- Gassend, B., Clarke, D., van Dijk, M. and Devadas, S. Silicon physical random functions. ACM Conference on Computer and Communication Security (2002). Google ScholarDigital Library
- Lim, D. Extracting secret keys from integrated circuits. Master's thesis, MIT, 2004.Google Scholar
- Majzoobi, M. Rostami, M., Koushanfar, F., Wallach, D. and Devadas, S. SlenderPUF: A lightweight, robust and secure strong PUF by substring matching. IEEE International Workshop on Trustworthy Embedded Devices (2012).Google Scholar
- Quadir, S. E., Chen, J., Forte, D., Asadizanjani, N., Shahbazmohamadi, S., Wang, L., Chandy, J. and Tehranipoor, M. A survey on chip-to-system reverse engineering. ACM Journal on Emerging Technologies in Computing Systems 13, 1 (2016). Google ScholarDigital Library
- Quinn, G. and Grother, P. IREX III: Supplement I: Failure Analysis. NIST Interagency Report 7853 (2012).Google Scholar
- Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S. and Schmidhuber, J. Modeling attacks on physical unclonable functions. ACM Conference on Computer and Communication Security (2010). Google ScholarDigital Library
- Rührmair, U., Sölter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W. and Devadas, S. PUF modeling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security 8, 11 (2013), 1876--1891. Google ScholarDigital Library
- Schneier, B. Sensible authentication. ACM Queue 1, 10 (2004): 74--78. Google ScholarDigital Library
- Suh, G.E. and Devadas, S. Physical unclonable functions for device authentication and secret key generation. Design Automation Conference (2007), 9--14. Google ScholarDigital Library
- Suh, G.E. AEGIS: A single-chip secure processor. Ph.D. thesis. Electrical Engineering and Computer Science Dept., MIT, 2005. Google ScholarDigital Library
- Valiant, L. A theory of the learnable. Commun. ACM 27, 11 (1984), 1134--1142. Google ScholarDigital Library
- Valsorda, F. The ECB penguin, 2013; https://blog.filippo.io/the-ecb-penguin/.Google Scholar
- Wilson, C., Hicklin, R., Bone, M., Korves, H., Grother P., Ulery, B., Micheals, R., Zoepfl, M., Otto, S. and Watson, C. Fingerprint vendor technology evaluation 2003: summary of results and analysis report. NIST Internal Report 7123 (2004).Google ScholarCross Ref
- Xilinx Inc. Xilinx addresses rigorous security demands at 5th Annual Working Group for Broad Range of Applications, 2016; http://www.prnewswire.com/news-releases/xilinx-addresses-rigorous-security-demands-at-fifth-annual-working-group-for-broad-range-of-applications-300351291.html.Google Scholar
- Yu, M. Hiller, M., Delvaux, J., Sowell, R., Devadas, S. and Verbauwhede, I. A lockdown technique to prevent machine learning on PUFs for lightweight authentication. IEEE Transactions on Multi-Scale Computing Systems 2, 3 (2016): 146--159.Google ScholarCross Ref
- Yu, M., M'Raïhi, D., Verbauwhede, I. and Devadas, S. A noise bifurcation architecture for linear additive physical functions. IEEE International Symposium on Hardware Oriented Security and Trust (2014), 124--129.Google ScholarCross Ref
Index Terms
- Pervasive, dynamic authentication of physical items
Recommendations
Pervasive, Dynamic Authentication of Physical Items: The use of silicon PUF circuits
AuthenticationAuthentication of physical items is an age-old problem. Common approaches include the use of bar codes, QR codes, holograms, and RFID (radio-frequency identification) tags. Traditional RFID tags and bar codes use a public identifier as a means of ...
Practical deniable authentication for pervasive computing environments
Pervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two ...
Connecting the Physical World with Pervasive Networks
This article addresses the challenges and opportunities of instrumenting the physical world with pervasive networks of sensor-rich, embedded computation. Such systems will fulfill two of Mark Weiser's key objectives-ubiquity, by injecting computation ...
Comments