Identities for embedded systems enabled by physical unclonable functions

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Embedded systems, such as automotive control units, industrial automation systems, RFID tags or mobile devices are dominated by integrated circuits implementing their functionality. Since these systems operate in increasingly networked or untrusted environments, their protection against attacks and malicious manipulations becomes a critical security issue. Physical Unclonable Functions (PUFs) represent an interesting solution to enable security on embedded systems, since they allow identification and authentication of CMOS devices without non-volatile memory. In this paper, we explain benefits and applications of PUFs and give an overview of popular implementations. Further, we show that PUFs face hardware as well as modeling attacks. Therefore, specific analyses and hardening has to be performed, in order to establish PUFs as a reliable security primitive for embedded systems. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Merli, D., Sigl, G., & Eckert, C. (2013). Identities for embedded systems enabled by physical unclonable functions. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8260 LNCS, 125–138. https://doi.org/10.1007/978-3-642-42001-6_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free