2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2013
DOI: 10.1109/hst.2013.6581556
|View full text |Cite
|
Sign up to set email alerts
|

Cloning Physically Unclonable Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
115
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 234 publications
(116 citation statements)
references
References 16 publications
0
115
0
1
Order By: Relevance
“…Other costs include damage to reputation, toxic waste cleanup, product returns, lost product cycles as in the case of the Samsung Galaxy 7 (possibly due to adding the "feature" of rapid battery charging [34]), refunds, and staff for customer support, etc. So far the cost to suppliers and users of hijacked IoT devices is near zero, so the crash rate is very high.…”
Section: Resultsmentioning
confidence: 99%
“…Other costs include damage to reputation, toxic waste cleanup, product returns, lost product cycles as in the case of the Samsung Galaxy 7 (possibly due to adding the "feature" of rapid battery charging [34]), refunds, and staff for customer support, etc. So far the cost to suppliers and users of hijacked IoT devices is near zero, so the crash rate is very high.…”
Section: Resultsmentioning
confidence: 99%
“…Tarnovsky [51] demonstrated the vulnerability of the algorithms and circuits that are utilized to process the PUF responses to invasive attacks through micro-probing the logic blocks, registers and the bus transfer of PUF devices. As for SRAM PUFs, they are susceptible to extreme operating conditions [52] and physical tampering [53]. As a result, the SRAM PUF hardware can be physically inspected and modified [54].…”
Section: ) Attacks On Weak Pufsmentioning
confidence: 99%
“…As a result, the SRAM PUF hardware can be physically inspected and modified [54]. Furthermore, it was established by Helfmeier et al [53] that upon gaining the response of an SRAM PUF, C 1 , a focus ion 132 | P a g e www.ijacsa.thesai.org beam (FIB) can be utilized to alter the circuits of SRAM PUF, C 2 so that C 2 will have a very similar challenge/response behavior as C 1 .…”
Section: ) Attacks On Weak Pufsmentioning
confidence: 99%
“…They became a vibrant field of research during the last years and promised to be "a means of building secure smartcards" due to their assumed resistance to physical attacks [76]. Very recently, however, it was shown that SRAM PUFs are not unclonable [88] and the same setup that we used for the photonic side channel attacks was used to prove that all arbiter PUFs can be completely and linearly characterized by means of PEA [166].…”
Section: Advice For Cryptographersmentioning
confidence: 99%