-
1
-
-
80051967839
-
A formalization of the security features of physical functions
-
F. Armknecht, R. Maes, A.-R. Sadeghi, F.-X. Standaert, and C. Wachsmann. A formalization of the security features of physical functions. In IEEE Symposium on Security and Privacy (S&P), 2011.
-
(2011)
IEEE Symposium on Security and Privacy (S&P
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Standaert, F.-X.4
Wachsmann, C.5
-
8
-
-
84903215672
-
Reverse fuzzy extractors: Enabling lightweight mutual authentication for puf-enabled rfids
-
A. Herrewege, S. Katzenbeisser, R. Maes, R. Peeters, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann. Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs. In Financial Cryptography and Data Security (FC). 2012.
-
(2012)
Financial Cryptography and Data Security (FC
-
-
Herrewege, A.1
Katzenbeisser, S.2
Maes, R.3
Peeters, R.4
Sadeghi, A.-R.5
Verbauwhede, I.6
Wachsmann, C.7
-
9
-
-
68949175522
-
Power-up sram state as an identifying fingerprint and source of true random numbers
-
D. Holcomb, W. Burleson, and K. Fu. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Transactions on Computers, 58(9), 2009.
-
(2009)
IEEE Transactions on Computers
, vol.58
, pp. 9
-
-
Holcomb, D.1
Burleson, W.2
Fu, K.3
-
11
-
-
84887212668
-
Pufs: Myth, fact or busted? A security evaluation of physically unclonable functions (pufs) cast in silicon
-
S. Katzenbeisser, U. Kocabas, V. Rozic, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann. PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon. In Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2012.
-
(2012)
Workshop on Cryptographic Hardware and Embedded Systems (CHES
-
-
Katzenbeisser, S.1
Kocabas, U.2
Rozic, V.3
Sadeghi, A.-R.4
Verbauwhede, I.5
Wachsmann, C.6
-
15
-
-
84878354800
-
New results for timing-based attestation
-
X. Kovah, C. Kallenberg, C. Weathers, A. Herzog, M. Albin, and J. Butterworth. New results for timing-based attestation. In IEEE Symposium on Security and Privacy (S&P), 2012.
-
(2012)
IEEE Symposium on Security and Privacy (S&P
-
-
Kovah, X.1
Kallenberg, C.2
Weathers, C.3
Herzog, A.4
Albin, M.5
Butterworth, J.6
-
17
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
Springer
-
R. Maes and I. Verbauwhede. Physically unclonable functions: A study on the state of the art and future research directions. In Towards Hardware-Intrinsic Security. Springer, 2010.
-
(2010)
Towards Hardware-Intrinsic Security.
-
-
Maes, R.1
Verbauwhede, I.2
-
21
-
-
76949093125
-
Techniques for design and implementation of secure reconfigurable pufs
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak. Techniques for design and implementation of secure reconfigurable PUFs. ACM TRETS, 2(1), 2009.
-
(2009)
ACM RETS
, vol.2
, pp. 1
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
22
-
-
84864182393
-
Slender puf protocol: A lightweight, robust, and secure authentication by substring matching
-
M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. In IEEE Symposium on Security and Privacy Workshops (SPW), 2012.
-
(2012)
IEEE Symposium on Security and Privacy Workshops (SPW
-
-
Majzoobi, M.1
Rostami, M.2
Koushanfar, F.3
Wallach, D.S.4
Devadas, S.5
-
23
-
-
75649141765
-
Ultralow-power design in near-threshold region
-
D. Markovic, C. Wang, L. Alarcon, T.-T. Liu, and J. Rabaey. Ultralow-power design in near-threshold region. In Proceedings of the IEEE, 2010.
-
(2010)
Proceedings of the IEEE
-
-
Markovic, D.1
Wang, C.2
Alarcon, L.3
Liu, T.-T.4
Rabaey, J.5
-
25
-
-
70350710800
-
Chung. Selective wordline voltage boosting for caches to manage yield under process variations
-
Y. Pan, J. Kong, S. Ozdemir, G. Memik, and S. W. Chung. Selective wordline voltage boosting for caches to manage yield under process variations. In Design Automation Conference (DAC), 2009.
-
(2009)
Design Automation Conference (DAC
-
-
Pan, Y.1
Kong, J.2
Ozdemir, S.3
Memik, G.4
Chung, S.W.5
-
27
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber. Modeling attacks on physical unclonable functions. In ACM Conference on Computer and Communications Security (CCS), 2010.
-
(2010)
ACM Conference on Computer and Communications Security (CCS
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
28
-
-
84899905957
-
Power and timing side channels for pufs and their efficient exploitation
-
U. Rührmair, X. Xu, J. Sölter, A. Mahmoud, F. Koushanfar, and W. Burleson. Power and timing side channels for pufs and their efficient exploitation. IACR Cryptology ePrint Archive, 2013.
-
(2013)
IACR Cryptology ePrint Archive
-
-
Rührmair, U.1
Xu, X.2
Sölter, J.3
Mahmoud, A.4
Koushanfar, F.5
Burleson, W.6
-
31
-
-
34247361254
-
Scuba: Secure code update by attestation in sensor networks
-
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. SCUBA: Secure code update by attestation in sensor networks. In ACM Workshop on Wireless security (WiSe), 2006.
-
(2006)
ACM Workshop on Wireless security (WiSe
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
32
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In ACM Symposium on Operating Systems Principles (SOSP), 2005.
-
(2005)
ACM Symposium on Operating Systems Principles (SOSP
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
34
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Design Automation Conference (DAC), 2007.
-
(2007)
Design Automation Conference (DAC
-
-
Suh, G.E.1
Devadas, S.2
-
36
-
-
84903214707
-
-
Trusted Computing Group (TCG)
-
Trusted Computing Group (TCG). TPM Spec., 2004.
-
(2004)
TPM Spec
-
-
|