首页> 外文会议>2014 Design, Automation amp; Test in Europe Conference and Exhibition >Physical vulnerabilities of Physically Unclonable Functions
【24h】

Physical vulnerabilities of Physically Unclonable Functions

机译:物理上无法克隆的功能的物理漏洞

获取原文
获取原文并翻译 | 示例

摘要

In recent years one of the most popular areas of research in hardware security has been Physically Unclonable Functions (PUF). PUFs provide primitives for implementing tamper detection, encryption and device fingerprinting. One particularly common application is replacing Non-volatile Memory (NVM) as key storage in embedded devices like smart cards and secure microcontrollers. Though a wide array of PUF have been demonstrated in the academic literature, vendors have only begun to roll out PUFs in their end-user products. Moreover, the improvement to overall system security provided by PUFs is still the subject of much debate. This work reviews the state of the art of PUFs in general, and as a replacement for key storage in particular. We review also techniques and methodologies which make the physical response characterization and physical/digital cloning of PUFs possible.
机译:近年来,硬件安全研究中最流行的领域之一是物理上不可克隆的功能(PUF)。 PUF提供了用于实现篡改检测,加密和设备指纹识别的原语。一种特别常见的应用是替换非易失性存储器(NVM)作为嵌入式设备(如智能卡和安全微控制器)中的密钥存储。尽管在学术文献中已经展示了各种各样的PUF,但是供应商才刚刚开始在其最终用户产品中推出PUF。而且,由PUF提供的整体系统安全性的改进仍然是许多争论的主题。这项工作总体上回顾了PUF的技术水平,尤其是替代了密钥存储。我们还将审查使PUF的物理响应表征和物理/数字克隆成为可能的技术和方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号