{"title":"Physically Unclonable Functions: Principle, Advantages and Limitations","authors":"J. Danger","doi":"10.1109/ATC.2019.8924551","DOIUrl":null,"url":null,"abstract":"The Physically Unclonable Function (PUF) has become an inescapable security primitive, as it generates a fingerprint unique to each device, and is natively robust against reverse engineering attacks. It allows the user to devise authentication protocols or protect specific software or hardware blocks. However, it natively suffers from a lack of reliability, is sensible to modeling and physical attacks, and its entropy must ensure a good uniquenesses. Hence, it requires specific method and processing blocks to make it robust steady and unique. This talk gives an overview of PUF principles, its main applications, the main architecture types and the ways to correct its inherent defects to provide a trusted primitive.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"162 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Advanced Technologies for Communications (ATC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATC.2019.8924551","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The Physically Unclonable Function (PUF) has become an inescapable security primitive, as it generates a fingerprint unique to each device, and is natively robust against reverse engineering attacks. It allows the user to devise authentication protocols or protect specific software or hardware blocks. However, it natively suffers from a lack of reliability, is sensible to modeling and physical attacks, and its entropy must ensure a good uniquenesses. Hence, it requires specific method and processing blocks to make it robust steady and unique. This talk gives an overview of PUF principles, its main applications, the main architecture types and the ways to correct its inherent defects to provide a trusted primitive.