Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks
Just over a decade ago, Physical Unclonable Functions (PUFs) have been introduced as a new cryptographic and security primitive in a number of seminal publications. Due to their assumed security and cost advantages, they have attracted substantial attention both from the security industry and the ac...
Saved in:
Published in | 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE) pp. 1 - 4 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
EDAA
01.03.2014
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Just over a decade ago, Physical Unclonable Functions (PUFs) have been introduced as a new cryptographic and security primitive in a number of seminal publications. Due to their assumed security and cost advantages, they have attracted substantial attention both from the security industry and the academic community, and are also gaining ground in commercial applications. Nevertheless, a number of recent works have presented successful attacks on PUF core properties, such as their digital and physical unclonability. How strong and relevant are these attacks, and how secure are PUFs really? This question is addressed in a dedicated hot topic session at DATE 2014. This paper provides a short and easily accessible overview of the session. |
---|---|
ISSN: | 1530-1591 1558-1101 |
DOI: | 10.7873/DATE.2014.359 |