2014 IEEE 6th International Memory Workshop (IMW) 2014
DOI: 10.1109/imw.2014.6849385
|View full text |Cite
|
Sign up to set email alerts
|

Understanding sources of variations in flash memory for physical unclonable functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Process variations are intrinsic, naturally occurring sources of entropy created in the fabrication process of ICs. Process variations are exploited for various hardware security primitives due to their uncontrollable but reproducible randomness [44]. They are also common in flash memories and mainly come from random dopant fluctuations (RDF).…”
Section: Sources Of Process Variation In Flash Memoriesmentioning
confidence: 99%
See 2 more Smart Citations
“…Process variations are intrinsic, naturally occurring sources of entropy created in the fabrication process of ICs. Process variations are exploited for various hardware security primitives due to their uncontrollable but reproducible randomness [44]. They are also common in flash memories and mainly come from random dopant fluctuations (RDF).…”
Section: Sources Of Process Variation In Flash Memoriesmentioning
confidence: 99%
“…They are also common in flash memories and mainly come from random dopant fluctuations (RDF). The RDF fluctuations can be induced by traditional flash programming commands that are standardized in the Open NAND Flash Interface (ONFI) [44]. This leads to more flexible flash memory-based hardware security primitive solutions that can be introduced through a variety of implementations such as Read Disturb, Program Disturb, Program/Erase Interrupt, Program/Erase Latency, and Random Telegraph Noise (RTN).…”
Section: Sources Of Process Variation In Flash Memoriesmentioning
confidence: 99%
See 1 more Smart Citation
“…Unlike previous methods, PUFs are less vulnerable to attacks, and also require no additional manufacturing steps. A variety of different types of PUFs has been explored recently, including Arbiter PUF, ringoscillator (RO)-PUF, SRAM PUF, Latch PUF, and many more [2,3,18,19,[21][22][23]43]. This paper explores utilizing the popular SRAM PUF for identification and cryptographic key generation.…”
Section: Introductionmentioning
confidence: 99%
“…Different PUF realizations have been reported in literature over the past decade. Silicon (CMOS) PUFs include ring oscillator based PUF (RO-PUF), Arbiter based PUF, SRAM-based PUF, Sense-amplifier based PUF, Butterfly PUF, Flash PUF, etc., [3]- [13], [15], [16]. Different types of PUFs exploit different physical entities, including leakage, delay, start-up characteristics, among others, to provide randomness in their outputs.…”
Section: Introductionmentioning
confidence: 99%