Proceedings of the 48th Design Automation Conference 2011
DOI: 10.1145/2024724.2024793
|View full text |Cite
|
Sign up to set email alerts
|

Device aging-based physically unclonable functions

Abstract: To improve resiliency against reverse engineering we propose dynamic physically unclonable functions (DPUFs) whose physical properties are subject to unpredictable changes between uses. We demonstrate this idea using device aging to alter delay characteristics according to user instructions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 37 publications
(26 citation statements)
references
References 10 publications
(10 reference statements)
0
26
0
Order By: Relevance
“…To satisfy those two criterions, [8] proposed a malware detection system of AV software by matching automatically generated behaviour's models against the runtime behaviour of unknown programs. Also, Rahmatian et al [12] used a CFG to detect intrusion for secured embedded system by detecting behavioural differences between the target system and malware. In their system, each executing process is associated with a finite state machine (FSM) that recognizes the sequences of system calls generated by the correct program.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To satisfy those two criterions, [8] proposed a malware detection system of AV software by matching automatically generated behaviour's models against the runtime behaviour of unknown programs. Also, Rahmatian et al [12] used a CFG to detect intrusion for secured embedded system by detecting behavioural differences between the target system and malware. In their system, each executing process is associated with a finite state machine (FSM) that recognizes the sequences of system calls generated by the correct program.…”
Section: Related Workmentioning
confidence: 99%
“…So, in the second test, the RS code was set to RS (6,4). After that, we keep increase the message length and code word until they reach RS (12,10). In this experiment, we set k i to 125 for server 1, 2, 3, 4, 5 and 9 but set k i to 220 for server 6, 7 and 8.…”
Section: False Negative Rate Vs Rs Codesmentioning
confidence: 99%
“…A main ramification of NBTI is a significant speed degradation of the pertinent gates ( [1], [6] ). Employment of device aging has been proposed for software metering ( [7]), hardware-based cryptography ( [8]), and prevention of reverse engineering ( [2]). …”
Section: Related Workmentioning
confidence: 99%
“…Considering the possible on-line replay attack, we develop a trusted HT detection approach based on the use of physically unclonable functions (PUFs) [17] [30] . A PUF is a specially designed circuitry in which the prediction of output signals from known inputs is computationally infeasible, unless one has access to the netlist of the circuitry and conduct simulations.…”
Section: Trusted Ht Detection Using Physical Unclonable Functionsmentioning
confidence: 99%