2021
DOI: 10.1007/978-981-16-0422-5_8
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Security Attacks on Silicon Based Weak PUF Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Silicon-based PUF take advantages of small and random variations within materials, which cause circuits to response slightly different to the same excitation at electrical and physical level [46]. Signals may propagate at different speeds through the material, or thresholds voltages may change.…”
Section: Physical Unclonable Functions Modelingmentioning
confidence: 99%
“…Silicon-based PUF take advantages of small and random variations within materials, which cause circuits to response slightly different to the same excitation at electrical and physical level [46]. Signals may propagate at different speeds through the material, or thresholds voltages may change.…”
Section: Physical Unclonable Functions Modelingmentioning
confidence: 99%
“…A limited response space could be the result of challenges. The outside world might have access to any or all of the responses produced by weak PUFs [38,39]. This may be a trait of some implementations which could in some circumstances compromise their security.…”
Section: Based On Securitymentioning
confidence: 99%