Introduction to Hardware Security and Trust 2011
DOI: 10.1007/978-1-4419-8080-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Metering: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
2

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 47 publications
(13 citation statements)
references
References 17 publications
0
11
0
2
Order By: Relevance
“…For example, Weak PUFs, also known as Physically Obfuscated Keys (POKs) are commonly used for key generation applications. The other type is called Strong PUF [12]. Strong PUFs are built based on the unclonable disorder in the physical device features, with very many challenge-response pairs.…”
Section: Background On Strong Pufsmentioning
confidence: 99%
“…For example, Weak PUFs, also known as Physically Obfuscated Keys (POKs) are commonly used for key generation applications. The other type is called Strong PUF [12]. Strong PUFs are built based on the unclonable disorder in the physical device features, with very many challenge-response pairs.…”
Section: Background On Strong Pufsmentioning
confidence: 99%
“…Without a key, the fabricated chip cannot work properly. This method prevents foundries to overproduce ICs and monitors the number of produced ICs [12]. The FPGA-oriented IP protection approaches make use of encryption algorithms and the characteristics of FPGAs, such as self-reconfiguration [13] and programmable logic block redundancy [14].…”
Section: B Hardware Watermarkingmentioning
confidence: 99%
“…For example, Weak PUFs, also known as Physically Obfuscated Keys (POKs) are commonly used for key generation applications. Following the taxonomy in [8], the class of PUF that is of interest in this paper is called a Strong PUF. Strong PUFs are built based on the unclonability and disorder in the physical device features, with very many challenge-response pairs.…”
Section: A Strong Pufs and Their Implementationmentioning
confidence: 99%
“…To be secure, they should be resilient to machine learning and prediction attacks. Important applications of Strong PUFs include identification, authentication, and key establishment [8].…”
Section: A Strong Pufs and Their Implementationmentioning
confidence: 99%