2016
DOI: 10.1109/tie.2016.2570720
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Evaluation of PUF-Based SoC Designs for Security Applications

Abstract: The working title of her thesis is "PUF based security in Systems on Chip". Her research is focused on trusted systems on chip with untrusted IP cores. She received her B. Sc. in computer and information technology and her M. Sc. in electronics engineering and telecommunications, both from Transilvania University of Brasov, in 2011 and 2013 respectively. Marcian N. Cirstea (M'97-SM'04) received a degree in electrical engineering in 1990 from

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Extracting keys from FPGA-based PUFs using the highly structured nature of modern FPGAs is solution whose feasibility was demonstrated in [23].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Extracting keys from FPGA-based PUFs using the highly structured nature of modern FPGAs is solution whose feasibility was demonstrated in [23].…”
Section: Resultsmentioning
confidence: 99%
“…7a, b, are presented in Table 1. The main properties of PUF circuits (randomness and uniqueness) were also analyzed in [23,24]. Our proof-of-concept study considers 30 identical Spartan 3E devices and 4 Spartan 6 devices.…”
Section: Resultsmentioning
confidence: 99%
“…In most previous studies, the performance was estimated based on the frequency of pulses generated by the RO [3,5,7,8,[13][14][15][16][17][18][19]. The frequency of RO pulses was measured using an oscilloscope or a logic analyzer.…”
Section: The Proposed Ro-pufmentioning
confidence: 99%
“…IoT and step-by-step analyzed from security conformance point of view based on X.805 standard that proposes three security layers (application, services, and infrastructure); three security planes (end-user, control, and management), which are based on the performed activates over the network, and eight security dimensions to address general system vulnerabilities (access control, authentication, nonreputation, data confidentiality, communication security, data integrity, availability, and privacy) [42,43].…”
Section: Security Aspects Lisp Was Considered As a Protocol Formentioning
confidence: 99%