Learn More
As system security demands continue to evolve, Physically Unclonable Functions (PUFs) are a promising solution for secure storage on Integrated Circuits (ICs). SRAM PUFs are among the most popular types of PUFs, since they require no additional circuitry and can be implemented with on-die memories such as caches and data memory that are readily available on(More)
As the surplus market of failure analysis equipment continues to grow, the cost of performing invasive IC analysis continues to diminish. Hardware vendors in high-security applications utilize security by obscurity to implement layers of protection on their devices. High-security applications must assume that the attacker is skillful, well-equipped and(More)
As intended by its name, Physically Unclonable Functions (PUFs) are considered as an ultimate solution to deal with insecure storage , hardware counterfeiting, and many other security problems. However , many different successful attacks have already revealed vulnera-bilities of certain digital intrinsic PUFs. Although settling-state-based PUFs, such as(More)
— DC-Step-Stress-Tests of GaN HEMTs have been performed on wafers with and without GaN-cap. The tests consist of a step ramping of drain-source voltage V DS by 5V every two hours at off-state. The irreversible evolution of leakage current starting at a certain drain voltage has been taken as a criterion for the onset of device degradation. It has been(More)
Dealing with timing related soft fails has become predominant with recent technologies and is expected more so future. A backside FIB edit procedure allowed trimming of internal timing conditions, with demonstrated FIB-induced speed enhancement ≫ 20%. This proposed technique seems applicable to any on chip circuitry, expanding rapid prototyping(More)
In recent years one of the most popular areas of research in hardware security has been Physically Unclonable Functions (PUF). PUFs provide primitives for implementing tamper detection, encryption and device fingerprinting. One particularly common application is replacing Non-volatile Memory (NVM) as key storage in embedded devices like smart cards and(More)