2018
DOI: 10.20944/preprints201804.0369.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Intrinsic Run-time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security

Abstract: Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic protocols. However, as recent work has demonstrated, the times needed in order to generate their responses may prohibit their widespread usage. In order to address this issue, the Row Hammer PUF has been proposed by Schaller et al. [1], which leverages the row hammer effect in DRAM modules to reduce the ret… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…Rowhammer can be leveraged as a Physically-unclonable Function (PUF) [24,1], a security primitive that uses the physical variations specific to individual hardware components to generate unique and unpredictable cryptographic keys. For Rowhammer, the physical variation in DRAM cells can be used to generate a unique bit flip sequence that can be used as a basis for further cryptographic operations.…”
Section: Rowhammer As Physically-unclonable Function (Puf)mentioning
confidence: 99%
See 1 more Smart Citation
“…Rowhammer can be leveraged as a Physically-unclonable Function (PUF) [24,1], a security primitive that uses the physical variations specific to individual hardware components to generate unique and unpredictable cryptographic keys. For Rowhammer, the physical variation in DRAM cells can be used to generate a unique bit flip sequence that can be used as a basis for further cryptographic operations.…”
Section: Rowhammer As Physically-unclonable Function (Puf)mentioning
confidence: 99%
“…When we used a fixed 256 MB memory region and hammering pattern, in the most extreme case, we achieve on average 13 282 bit flips on 3 machines, but no bit flip on the 4th machine. This insight that even identical setups significantly impact bit flips directly affects proposals that rely on Rowhammer as a physical-unclonable function [24,1].…”
Section: Introductionmentioning
confidence: 99%
“…The errors caused by the rowhammer disturbance are used to generate device signatures [18], [19]. This technique does not require any additional power cycle.…”
Section: ) Rowhammer Dpufsmentioning
confidence: 99%
“…Therefore, this type of PUF cannot be evaluated while the system is in operation. • Large Evaluation Time: Rowhammer-based and retention-based key generation techniques require an order of minutes to generate enough bit failures and therefore not suitable for many applications [13]- [15], [18], [19], [49]. On the other hand, the existing latencybased DPUF still needs multiple row cycles (reading one data burst at each cycle) to evaluate the PUF key [20] since the reduction in activation time only affects the first few bits in the cache line (see Section II-C).…”
Section: E Motivationsmentioning
confidence: 99%
See 1 more Smart Citation