• Corpus ID: 9881907

SRAM PUF : The Secure Silicon Fingerprint

  title={SRAM PUF : The Secure Silicon Fingerprint},
  • Published 2017
For many years, silicon Physical Unclonable Functions (PUFs) have been seen as a promising and innovative security technology that was making steady progress. Today, Static Random-Access Memory (SRAM)-based PUFs offer a mature and viable security component that is achieving widespread adoption in commercial products. They are found in devices ranging from tiny sensors and microcontrollers to high-performance Field-Programmable Gate Arrays (FPGAs) and secure elements where they protect financial… 

Figures from this paper

A Reliable PUF in a Dual Function SRAM
This paper proposes a bit selection technique to mitigate the NBTI effect when an instruction cache is used as a PUF and shows that this technique can reduce the predicted bit error in an SRAM-PUF from 14.18% to 5.58% over 5 years.
Extend MCU Security Capabilities Beyond Trusted Execution – White Paper
This paper discusses our approach to crypto acceleration and asset protection using novel techniques that help bring high levels of security to low-cost microcontrollers with minimal power and area
Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAs
This work publishes a dataset containing 100 repeated measurements of 6592 ring oscillators (ROs) on 217 Xilinx Artix-7 XC7A35T FPGAs, which is both larger, and based on a more recent technology node than other publicly available datasets of related work.
IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks
A secure patching framework for IoT with different network isolation levels to efficiently mitigate and control malware propagation and uses remote attestation to detect compromised devices with a high probability and identify the origin of malicious activities.
An ICMetric based multiparty communication framework
The schemes presented in this thesis demonstrate that key theft deterrent technologies can be incorporated into cryptographic schemes to offer higher levels of security and privacy.
PMAKE: Physical Unclonable Function-based Mutual Authentication Key Exchange Scheme for Digital Aeronautical Communications
A concept for a challenge-response (CR) based Physical Unclonable Function (PUF) Mutual Authentication Key Exchange scheme, short PMAKE, binding communication identity and radio device together is proposed and initial evaluations show its suitability for the digital aeronautical communications system LDACS.


Reusable cryptographic fuzzy extractors
This work describes the conditions that fuzzy extractors need to satisfy to be secure, and presents generic constructions from ordinary building blocks, and demonstrates how to use a biometric secret in a remote fuzzy authentication protocol that does not require any storage on the client's side.