Pehl et al., 2016 - Google Patents
Efficient evaluation of physical unclonable functions using entropy measuresPehl et al., 2016
- Document ID
- 2218556747520533088
- Author
- Pehl M
- Hiller M
- Graeb H
- Publication year
- Publication venue
- Journal of Circuits, Systems and Computers
External Links
Snippet
Physical unclonable functions (PUFs) are security primitives which are based on uncontrollable variations in the manufacturing process and can be used as secure key storage and for identification and authentication. While some work has been done on global …
- 238000011156 evaluation 0 title abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3183—Generation of test inputs, e.g. test vectors, patterns or sequence
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6261—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation partitioning the feature space
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Provably secure camouflaging strategy for IC protection | |
CN107276761B (en) | Apparatus and method for testing physical unclonable function | |
Maiti et al. | A robust physical unclonable function with enhanced challenge-response set | |
US10397251B2 (en) | System and method for securing an electronic circuit | |
Liu et al. | Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting | |
JP6608457B2 (en) | A method for generating physically unclonable function bitstreams with improved reliability | |
US8370787B2 (en) | Testing security of mapping functions | |
Alkabani et al. | Trusted integrated circuits: A nondestructive hidden characteristics extraction approach | |
US8880954B2 (en) | Temperature-profiled device fingerprint generation and authentication from power-up states of static cells | |
O’donnell et al. | PUF-based random number generation | |
CN105046170A (en) | Derivation of a Device-Specific Value | |
Bhattacharya et al. | Estimating component characteristics from system failure‐time data | |
Wei et al. | Self-consistency and consistency-based detection and diagnosis of malicious circuitry | |
Andrikos et al. | Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages | |
Pehl et al. | Advanced performance metrics for physical unclonable functions | |
Ngo et al. | Side-channel analysis of the random number generator in STM32 MCUs | |
Delvaux et al. | Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs | |
Pehl et al. | Efficient evaluation of physical unclonable functions using entropy measures | |
Liu et al. | A novel security key generation method for SRAM PUF based on Fourier analysis | |
Perkowski et al. | Test generation and fault localization for quantum circuits | |
Saqib et al. | ASIC implementation of a hardware‐embedded physical unclonable function | |
KR20170092601A (en) | Systems and methods for generating random numbers using physical variations present in material samples | |
Zhang et al. | Hardware Trojan detection with linear regression based gate-level characterization | |
Saha et al. | Embedding of signatures in reconfigurable scan architecture for authentication of intellectual properties in system‐on‐chip | |
Surabhi et al. | Golden-free robust age estimation to triage recycled ics |