2014 IEEE International Symposium on Circuits and Systems (ISCAS) 2014
DOI: 10.1109/iscas.2014.6865740
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic memory-based physically unclonable function for the generation of unique identifiers and true random numbers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
67
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(68 citation statements)
references
References 4 publications
1
67
0
Order By: Relevance
“…Random number generators can be broadly classi ed into two categories [32,78,145,148]: 1) pseudo-random number generators (PRNGs) [18,98,100,102,133], which deterministically generate numbers starting from a seed value with the goal of approximating a true random sequence, and 2) true random number generators (TRNGs) [6,16,22,23,24,33,36,47,50,55,56,57,65,77,83,96,101,111,116,119,141,143,144,146,149,151,153,155,158], which generate random numbers based on sampling non-deterministic random variables inherent in various physical phenomena (e.g., electrical noise, atmospheric noise, clock jitter, Brownian motion).…”
Section: Introductionmentioning
confidence: 99%
“…Random number generators can be broadly classi ed into two categories [32,78,145,148]: 1) pseudo-random number generators (PRNGs) [18,98,100,102,133], which deterministically generate numbers starting from a seed value with the goal of approximating a true random sequence, and 2) true random number generators (TRNGs) [6,16,22,23,24,33,36,47,50,55,56,57,65,77,83,96,101,111,116,119,141,143,144,146,149,151,153,155,158], which generate random numbers based on sampling non-deterministic random variables inherent in various physical phenomena (e.g., electrical noise, atmospheric noise, clock jitter, Brownian motion).…”
Section: Introductionmentioning
confidence: 99%
“…Finally, concluding remarks and future works are given in Section 6. The only previous work on DRAM PUF has been based on altering or disabling the refresh cycle [6]. Modern DRAM chips have a built-in self-refresh module, as they not only require a power supply to retain data, but must also be periodically refreshed to prevent their data contents from fading away from the capacitors in their integrated circuits.…”
Section: Contributions and Paper Organizationmentioning
confidence: 99%
“…A PUF is a promising solution to many security issues due its ability to generate an IC unique identifier that can resist cloning attempts as well as physical tampering. As an example, in [6] and [12], PUFs were used for device authentication and unique ID generation. Figure 1 shows the flow for using a PUF for device authentication.…”
Section: Introductionmentioning
confidence: 99%
“…are the most common techniques to generate responses from memory chips [1]. Previous works on DRAM PUFs (DPUFs) have focused on: (i) retention-based: writing all cells to '1' and disabling the refresh then waiting for half the cells to discharge and reading cell values [2], [13]- [15], (ii) start-up based: using the start-up values of the cells to generate the secret key as in [16], [17], and (iii) disturbance-based: disturbance caused by rowhammer [18], [19]. The variations in activation latency time have also been used to generate device signatures [20].…”
Section: Introductionmentioning
confidence: 99%