Learn More
We propose a novel variety of sensor that extends the functionality of conventional physical unclonable functions to provide authentication, unclonability, and verification of a sensed value. This new class of device addresses the vulnerability in typical sensing systems whereby an attacker can spoof measurements by interfering with the analog signals that(More)
We investigate the robustness of PRNU-based camera identification in cases where the test images have been passed through common image processing operations. A specific question we aim to answer is how camera identification can be circumvented by an nontechnical user, applying only standard and/or freely available software. We study denoising,(More)
a trusted design center and foundry, it is expensive and economically infeasible given current trends in the globalization of IC design and fabrication. On the other hand, verifying trustworthiness requires a postmanufacturing step to validate conformance of the fabricated IC to the original functional and performance specifications. A system-on-chip (SoC)(More)
We present Volleystore, a filesystem that stores data on network equipment and servers without any authorization, yet without compromising the systems that are used. This is achieved by exploiting the echo functionality present in most standard Internet protocols. Various issues concerning the design of a parasitic storage system are addressed and a(More)