Physically Unclonable Functions: Principle, Advantages and Limitations

J. Danger
{"title":"Physically Unclonable Functions: Principle, Advantages and Limitations","authors":"J. Danger","doi":"10.1109/ATC.2019.8924551","DOIUrl":null,"url":null,"abstract":"The Physically Unclonable Function (PUF) has become an inescapable security primitive, as it generates a fingerprint unique to each device, and is natively robust against reverse engineering attacks. It allows the user to devise authentication protocols or protect specific software or hardware blocks. However, it natively suffers from a lack of reliability, is sensible to modeling and physical attacks, and its entropy must ensure a good uniquenesses. Hence, it requires specific method and processing blocks to make it robust steady and unique. This talk gives an overview of PUF principles, its main applications, the main architecture types and the ways to correct its inherent defects to provide a trusted primitive.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"162 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Advanced Technologies for Communications (ATC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATC.2019.8924551","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The Physically Unclonable Function (PUF) has become an inescapable security primitive, as it generates a fingerprint unique to each device, and is natively robust against reverse engineering attacks. It allows the user to devise authentication protocols or protect specific software or hardware blocks. However, it natively suffers from a lack of reliability, is sensible to modeling and physical attacks, and its entropy must ensure a good uniquenesses. Hence, it requires specific method and processing blocks to make it robust steady and unique. This talk gives an overview of PUF principles, its main applications, the main architecture types and the ways to correct its inherent defects to provide a trusted primitive.
物理不可克隆功能:原理、优势与局限
物理不可克隆功能(PUF)已经成为一种不可避免的安全原语,因为它为每个设备生成唯一的指纹,并且对逆向工程攻击具有固有的鲁棒性。它允许用户设计认证协议或保护特定的软件或硬件块。然而,其固有的缺点是缺乏可靠性,容易受到建模和物理攻击,其熵必须保证良好的唯一性。因此,它需要特定的方法和处理块,使其健壮、稳定和独特。本演讲概述了PUF的原理、主要应用、主要体系结构类型以及纠正其固有缺陷以提供可信原语的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信