메뉴 건너뛰기




Volumn 9781441980809, Issue , 2012, Pages 65-102

Security based on physical unclonability and disorder

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL STORAGE; HARDWARE SECURITY; MALWARE;

EID: 84943152937     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4419-8080-9_4     Document Type: Chapter
Times cited : (109)

References (134)
  • 2
    • 4344584084 scopus 로고    scopus 로고
    • Master's thesis, Massachusetts Institute of Technology
    • Gassend B (2003) Physical random functions, Master's thesis, Massachusetts Institute of Technology
    • (2003) Physical Random Functions
    • Gassend, B.1
  • 7
    • 76949095784 scopus 로고    scopus 로고
    • Secure and robust error correction for physical unclonable functions
    • Yu M-D M, Devadas S (2010) Secure and robust error correction for physical unclonable functions. In: IEEE Design Test Comput 27:48-65
    • (2010) IEEE Design Test Comput , vol.27 , pp. 48-65
    • Yu, M.M.-D.1    Devadas, S.2
  • 11
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference (DAC), pp 9-14
    • (2007) Design Automation Conference (DAC) , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 13
    • 85010296813 scopus 로고    scopus 로고
    • Anti-counterfeiting: Mixing the physical and the digital world
    • Sadeghi A-R, Naccache D eds, Springer, Berlin, Heidelberg, New York
    • Kirovski D (2010) Anti-counterfeiting: mixing the physical and the digital world. In: Sadeghi A-R, Naccache D (eds) Towards Hardware-Intrinsic Security. Springer, Berlin, Heidelberg, New York, pp 223-233
    • (2010) Towards Hardware-intrinsic Security , pp. 223-233
    • Kirovski, D.1
  • 17
    • 84904854690 scopus 로고
    • Getting out of the STARTing block
    • Graybeal S, McFate P (1989) Getting out of the STARTing block. Scient Am (USA) 261(6):64-65
    • (1989) Scient Am (USA) , vol.261 , Issue.6 , pp. 64-65
    • Graybeal, S.1    McFate, P.2
  • 20
    • 31544454530 scopus 로고
    • A system for verifying user identity and authorization at the point-of sale or access
    • Simmons G (1984) A system for verifying user identity and authorization at the point-of sale or access. Cryptologia 8(1):1-21
    • (1984) Cryptologia , vol.8 , Issue.1 , pp. 1-21
    • Simmons, G.1
  • 25
    • 70450216812 scopus 로고    scopus 로고
    • Impact of surface roughness on laser surface authentication signatures under linear and rotational displacements
    • Seem P, Buchanan J, Cowburn R (2009) Impact of surface roughness on laser surface authentication signatures under linear and rotational displacements. Optic Lett 34(20):3175-3177
    • (2009) Optic Lett , vol.34 , Issue.20 , pp. 3175-3177
    • Seem, P.1    Buchanan, J.2    Cowburn, R.3
  • 29
    • 85193180158 scopus 로고    scopus 로고
    • aspx and http://www.research.bayer.com/edition-19/19 Protexxion en.pdfx
    • The ProteXXion System, Bayer AG, http://www.research.bayer.com/edition-19/protexxion.aspx and http://www.research.bayer.com/edition-19/19 Protexxion en.pdfx
    • The ProteXXion System, Bayer AG,1
  • 32
    • 3242793330 scopus 로고    scopus 로고
    • Toward an automated verification of certificates of authenticity
    • Kirovski D (2004) Toward an automated verification of certificates of authenticity. In: ACM Electronic Commerce (EC), pp 160-169
    • (2004) ACM Electronic Commerce (EC) , pp. 160-169
    • Kirovski, D.1
  • 33
    • 57349155782 scopus 로고    scopus 로고
    • Certifying authenticity via fiber-infused paper
    • Chen Y, Mihçak M, Kirovski D (2005) Certifying authenticity via fiber-infused paper. ACM SIGecom Exchanges 5(3):29-37
    • (2005) ACM SIGecom Exchanges , vol.5 , Issue.3 , pp. 29-37
    • Chen, Y.1    Mihçak, M.2    Kirovski, D.3
  • 34
    • 77957133407 scopus 로고    scopus 로고
    • How to strongly link data and its medium: The paper case
    • Bulens P, Standaert F, Quisquater J (2010) How to strongly link data and its medium: the paper case. IET Information Security 4(3):125-136
    • (2010) IET Information Security , vol.4 , Issue.3 , pp. 125-136
    • Bulens, P.1    Standaert, F.2    Quisquater, J.3
  • 35
    • 42949176008 scopus 로고
    • Kariakin Y (1995) Authentication of articles. Patent writing, WO/1997/024699, available from http://www.wipo.int/pctdb/en/wo.jsp?wo=1997024699
    • (1995) Authentication of Articles
    • Kariakin, Y.1
  • 39
    • 79951849981 scopus 로고    scopus 로고
    • RFID fibers for secure applications
    • Collins J (2004) RFID fibers for secure applications. RFID J 26
    • (2004) RFID J , pp. 26
    • Collins, J.1
  • 40
    • 85193194598 scopus 로고    scopus 로고
    • RF SAW Inc. http://www.rfsaw.com/tech.html
    • RF SAW Inc1
  • 41
    • 85193167452 scopus 로고    scopus 로고
    • Creo Inc. http://www.creo.com
    • Creo Inc1
  • 42
    • 85193171368 scopus 로고    scopus 로고
    • Inkode Inc. http://www.inkode.com
    • Inkode Inc1
  • 46
    • 85193173103 scopus 로고    scopus 로고
    • MagnePrint. http://www.magneprint.com
    • MagnePrint1
  • 48
    • 0033542456 scopus 로고    scopus 로고
    • Hiding messages in DNA microdots
    • Clelland C, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399(6736):533-534
    • (1999) Nature , vol.399 , Issue.6736 , pp. 533-534
    • Clelland, C.1    Risca, V.2    Bancroft, C.3
  • 49
    • 85193171344 scopus 로고    scopus 로고
    • November AG. http://www.november.de/archiv/pressemitteilungen/pressemitteilung/article/sichere-medikamente-dank-dna-codes-der-identif-gmbh%.html
    • November, A.G.1
  • 50
    • 26944440467 scopus 로고    scopus 로고
    • A point-set compression heuristic for fiber-based certificates of authenticity
    • Kirovski D (2005) A point-set compression heuristic for fiber-based certificates of authenticity. In: Data Compression Conference (DCC), pp 103-112
    • (2005) Data Compression Conference (DCC) , pp. 103-112
    • Kirovski, D.1
  • 51
    • 2642550143 scopus 로고    scopus 로고
    • Point compression for certificates of authenticity
    • -, (2004) Point compression for certificates of authenticity. In: Data Compression Conference (DCC), p 545
    • (2004) Data Compression Conference (DCC) , pp. 545
    • Kirovski, D.1
  • 52
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Springer, Berlin, Heidelberg, New York
    • Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Advances in cryptology-Eurocrypt. Springer, Berlin, Heidelberg, New York, pp 523-540
    • (2004) Advances in cryptology-Eurocrypt , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 58
    • 0034428343 scopus 로고    scopus 로고
    • Ic identification circuit using device mismatch
    • Lofstrom K, Daasch WR, Taylor D (2000) Ic identification circuit using device mismatch. In: ISSCC, pp 372-373
    • (2000) ISSCC , pp. 372-373
    • Lofstrom, K.1    Daasch, W.R.2    Taylor, D.3
  • 63
    • 70350741520 scopus 로고    scopus 로고
    • A physical unclonable function defined using power distribution system equivalent resistance variations
    • Helinski R, Acharyya D, Plusquellic J (2009) A physical unclonable function defined using power distribution system equivalent resistance variations. In: Design Automation Conference (DAC), pp 676-681
    • (2009) Design Automation Conference (DAC) , pp. 676-681
    • Helinski, R.1    Acharyya, D.2    Plusquellic, J.3
  • 64
    • 77956203762 scopus 로고    scopus 로고
    • Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
    • ser. DAC
    • -, (2010) Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system. In: Design Automation Conference, ser. DAC, pp 240-243
    • (2010) Design Automation Conference , pp. 240-243
    • Helinski, R.1    Acharyya, D.2    Plusquellic, J.3
  • 65
    • 33845221062 scopus 로고    scopus 로고
    • Ph. D. dissertation, Massachusetts Institute of Technology
    • Suh GE (2005) AEGIS: a Single-Chip Secure Processor. Ph. D. dissertation, Massachusetts Institute of Technology
    • (2005) AEGIS: A Single-chip Secure Processor
    • Suh, G.E.1
  • 66
    • 85077688405 scopus 로고    scopus 로고
    • Active hardware metering for intellectual property protection and security
    • Alkabani Y, Koushanfar F (2007) Active hardware metering for intellectual property protection and security. In: USENIX Security Symposium, pp 291-306
    • (2007) USENIX Security Symposium , pp. 291-306
    • Alkabani, Y.1    Koushanfar, F.2
  • 67
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true random numbers
    • Holcomb D, Burleson W, Fu K (2009) Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans Comput 58(9):1198-1210
    • (2009) IEEE Trans Comput , vol.58 , Issue.9 , pp. 1198-1210
    • Holcomb, D.1    Burleson, W.2    Fu, K.3
  • 68
    • 3242749566 scopus 로고    scopus 로고
    • Ph. D. dissertation, Massachusetts Institute of Technology
    • Pappu R (2001) Physical one-way functions. Ph. D. dissertation, Massachusetts Institute of Technology
    • (2001) Physical One-way Functions
    • Pappu, R.1
  • 72
    • 84903837858 scopus 로고    scopus 로고
    • Strong PUFs: Models, constructions, and security proofs
    • Sadeghi A-R, Naccache D eds, Springer, Berlin, Heidelberg, New York
    • Rührmair U, Busch H, Katzenbeisser S (2010) Strong PUFs: models, constructions, and security proofs. In: Sadeghi A-R, Naccache D (eds) Towards Hardware-Intrinsic Security. Springer, Berlin, Heidelberg, New York, pp 79-96
    • (2010) Towards Hardware-intrinsic Security , pp. 79-96
    • Rührmair, U.1    Busch, H.2    Katzenbeisser, S.3
  • 74
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits with identification and authentication applications
    • New-York
    • Lee J-W, Lim D, Gassend B, Suh GE, Van Dijk M, Devadas S (2004) A technique to build a secret key in integrated circuits with identification and authentication applications. In: IEEE VLSI Circuits Symposium, New-York
    • (2004) IEEE VLSI Circuits Symposium
    • Lee, J.-W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 75
    • 20044382924 scopus 로고    scopus 로고
    • Master's thesis, Massachusetts Institute of Technology, Cambridge, USA
    • Lim D (2004) Extracting Secret Keys from Integrated Circuits. Master's thesis, Massachusetts Institute of Technology, Cambridge, USA
    • (2004) Extracting Secret Keys from Integrated Circuits
    • Lim, D.1
  • 81
    • 56749170623 scopus 로고    scopus 로고
    • Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
    • Alkabani Y, Koushanfar F, Kiyavash N, Potkonjak M (2008) Trusted integrated circuits: a nondestructive hidden characteristics extraction approach. In: Information Hiding (IH), pp 102-117
    • (2008) Information Hiding (IH) , pp. 102-117
    • Alkabani, Y.1    Koushanfar, F.2    Kiyavash, N.3    Potkonjak, M.4
  • 93
    • 29144521874 scopus 로고    scopus 로고
    • How does the entropy/information bound work?
    • Bekenstein J (2005) How does the entropy/information bound work? Found Phys 35(11):1805-1823
    • (2005) Found Phys , vol.35 , Issue.11 , pp. 1805-1823
    • Bekenstein, J.1
  • 100
    • 44449165608 scopus 로고    scopus 로고
    • On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle
    • Škorić B (2008) On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle. J Optics A Pure Appl Optic 10(5):055304
    • (2008) J Optics a Pure Appl Optic , vol.10 , Issue.5 , pp. 055304
    • Škorić, B.1
  • 101
    • 33746785063 scopus 로고    scopus 로고
    • Information-theoretic analysis of capacitive physical unclonable functions
    • Skoric B, Maubach S, Kevenaar T, Tuyls P (2009) Information-theoretic analysis of capacitive physical unclonable functions. J Appl Phys 100(2):024902
    • (2009) J Appl Phys , vol.100 , Issue.2 , pp. 024902
    • Skoric, B.1    Maubach, S.2    Kevenaar, T.3    Tuyls, P.4
  • 105
    • 0004196480 scopus 로고
    • Ph. D. dissertation, Carnegie Mellon University
    • Yee BS (1994) Using secure coprocessors. Ph. D. dissertation, Carnegie Mellon University
    • (1994) Using Secure Coprocessors
    • Yee, B.S.1
  • 116
    • 70350469042 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically unclonable functions
    • Springer, Berlin, Heidelberg, New York
    • Beckmann N, Potkonjak M (2009) Hardware-based public-key cryptography with public physically unclonable functions. In: Information Hiding. Springer, Berlin, Heidelberg, New York, pp 206-220
    • (2009) Information Hiding , pp. 206-220
    • Beckmann, N.1    Potkonjak, M.2
  • 117
    • 85193186964 scopus 로고    scopus 로고
    • US Patent Application, Publication Number: US 2010/0293612 A1
    • Potkonjak M (2009) Secure authentication. US Patent Application 12/464, 387; Publication Number: US 2010/0293612 A1
    • (2009) Secure Authentication
    • Potkonjak, M.1
  • 118
    • 85193189284 scopus 로고    scopus 로고
    • US Patent Application, Publication Number: US 2010/0293384 A1
    • -, (2009) Digital signatures. US Patent Application 12/464, 384; Publication Number: US 2010/0293384 A1
    • (2009) Digital Signatures
    • Potkonjak, M.1
  • 120
  • 129
  • 130
    • 77953498275 scopus 로고    scopus 로고
    • Quantum readout of physical unclonable functions
    • ser. Bernstein D, Lange T eds Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, New York
    • Ékoric B (2010) Quantum readout of physical unclonable functions. In: Progress in Cryptology (AFRICACRYPT), ser. Bernstein D, Lange T (eds) Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, New York, vol 6055, pp 369-386
    • (2010) Progress in Cryptology (AFRICACRYPT) , vol.6055 , pp. 369-386
    • Ékoric, B.1
  • 133
    • 49749144533 scopus 로고    scopus 로고
    • Remote activation of ICs for piracy prevention and digital right management
    • Alkabani Y, Koushanfar F, Potkonjak M (2007) Remote activation of ICs for piracy prevention and digital right management. In: ICCAD
    • (2007) ICCAD
    • Alkabani, Y.1    Koushanfar, F.2    Potkonjak, M.3
  • 134
    • 77954743811 scopus 로고    scopus 로고
    • Oblivious transfer based on physical unclonable functions (extended abstract)
    • Acquisti A, Smith SW, Sadeghi A-R eds, Springer, Berlin, Heidelberg, New York
    • Rührmair U (2010) Oblivious transfer based on physical unclonable functions (extended abstract). In: Acquisti A, Smith SW, Sadeghi A-R (eds) TRUST, ser. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg, New York, pp 430-440
    • (2010) TRUST, Ser. Lecture Notes in Computer Science , vol.6101 , pp. 430-440
    • Rührmair, U.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.