PUF Based Hardware Security: A Review
In modern era, we are harnessing the power of electronic devices more than ever. It has become a part of our daily lives. Thus, the protection of the private data and hence the underlying hardware is becoming mandatory. In this survey, we discuss how this problem of hardware security is handled thro...
Saved in:
Published in | 2021 International Symposium on Devices, Circuits and Systems (ISDCS) pp. 1 - 6 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
03.03.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In modern era, we are harnessing the power of electronic devices more than ever. It has become a part of our daily lives. Thus, the protection of the private data and hence the underlying hardware is becoming mandatory. In this survey, we discuss how this problem of hardware security is handled through the use of Physically Unclonable Function (PUF) which are circuits used to create unique and reliable signatures of a particular electronic circuit. This paper describes in a chronological manner starting from the times of delay based PUFs to the recent times when we have the Machine Learning attack resistant model. It paves the way for addressing the security concerns of the modern development in IOT devices. |
---|---|
DOI: | 10.1109/ISDCS52006.2021.9397896 |