PUF Based Hardware Security: A Review

In modern era, we are harnessing the power of electronic devices more than ever. It has become a part of our daily lives. Thus, the protection of the private data and hence the underlying hardware is becoming mandatory. In this survey, we discuss how this problem of hardware security is handled thro...

Full description

Saved in:
Bibliographic Details
Published in2021 International Symposium on Devices, Circuits and Systems (ISDCS) pp. 1 - 6
Main Authors Dey, Koustav, Kule, Malay, Rahaman, Hafizur
Format Conference Proceeding
LanguageEnglish
Published IEEE 03.03.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In modern era, we are harnessing the power of electronic devices more than ever. It has become a part of our daily lives. Thus, the protection of the private data and hence the underlying hardware is becoming mandatory. In this survey, we discuss how this problem of hardware security is handled through the use of Physically Unclonable Function (PUF) which are circuits used to create unique and reliable signatures of a particular electronic circuit. This paper describes in a chronological manner starting from the times of delay based PUFs to the recent times when we have the Machine Learning attack resistant model. It paves the way for addressing the security concerns of the modern development in IOT devices.
DOI:10.1109/ISDCS52006.2021.9397896