2021
DOI: 10.3390/cryptography5010007
|View full text |Cite
|
Sign up to set email alerts
|

Flash-Based Security Primitives: Evolution, Challenges and Future Directions

Abstract: Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 69 publications
0
5
0
Order By: Relevance
“…In our work, we focus on Flash-memory-based PUFs implemented on NAND Flash memories using programming disturbances (and, thus, we will proceed to examine in more detail only this type of Flash-memory-based PUF), as this method has been proven to be effective in order to construct Flash-memory-based PUFs in COTS devices, and as Flash-memory-based PUFs implemented on NAND Flash memories using reading disturbances have been shown to provide responses of lower entropy, as they do not create as many disturbances as Flash-memory-based PUFs implemented on NAND Flash memories using programming disturbances do, for the same period of time required in order to produce the relevant responses. In general, it has also been noted that NAND Flash memories are cheaper than NOR Flash memories, with NAND Flash memories being used for data storage, and NOR ones for code storage and execution [160].…”
Section: Flash-memory-based Pufsmentioning
confidence: 99%
“…In our work, we focus on Flash-memory-based PUFs implemented on NAND Flash memories using programming disturbances (and, thus, we will proceed to examine in more detail only this type of Flash-memory-based PUF), as this method has been proven to be effective in order to construct Flash-memory-based PUFs in COTS devices, and as Flash-memory-based PUFs implemented on NAND Flash memories using reading disturbances have been shown to provide responses of lower entropy, as they do not create as many disturbances as Flash-memory-based PUFs implemented on NAND Flash memories using programming disturbances do, for the same period of time required in order to produce the relevant responses. In general, it has also been noted that NAND Flash memories are cheaper than NOR Flash memories, with NAND Flash memories being used for data storage, and NOR ones for code storage and execution [160].…”
Section: Flash-memory-based Pufsmentioning
confidence: 99%
“…Flash NAND memory has exploded in popularity for remote devices and IoT systems because of its high memory density, low cost, and ability to be programmed and erased electronically without moving parts. [ 6 ].…”
Section: Preliminariesmentioning
confidence: 99%
“…These variations are commonly caused by various disturbs caused by parasitic capacitance. By performing multiple read or program operations on sections of the flash chips, disturbs can be induced on these chips causing random fluctuations and bit flips [ 6 ]. These fluctuations depend on each cell’s relative gate thickness and width which are uncontrollable and extremely hard to model.…”
Section: Preliminariesmentioning
confidence: 99%
“…This key is usually deployed together with a cryptographic primitive to perform identification/authentication protocols [17]. The motivation of using a memory-store for identity can be summarized as follows [18]:…”
Section: Inherently-cloneable Identification Mechanismsmentioning
confidence: 99%