Brief introduction to Physically Unclonable Function signature methods, in the context of the Wireless Embedded Systems MSc course dissertation project.
attacks: Cannot be applied →Modelling attacks: Use a number of challenge/response pairs model the PUF (Rührmair 2010) March 2015 - Newcastle Upon Tyne, UK 7
data Security issues increasingly important (i.e. Internet of Things) Copyright and other legal issues Privacy protection is imperative March 2015 - Newcastle Upon Tyne, UK 9
Signature Block Data Signature Data PUF Key Verification Block Result Data Signature Source Device Verification third-party Develop a signature scheme aided by the PUF and a third-party verifier Signature Block Data Signature Data PUF Key Verification Block Result Data Signature Source Device Verification third-party
Devadas, “Physical unclonable functions and applications: A tutorial,” Proceedings of the IEEE, vol. 102, no. 8. pp. 1126–1141, 2014. D. E. Holcomb, W. P. Burleson, and K. Fu, “Power-Up SRAM state as an identifying fingerprint and source of true random numbers,” IEEE Trans. Comput., vol. 58, pp. 1198– 1210, 2009. U. Rührmair, F. Sehnke, J. S ölter, G. Dror, S. Devadas, and J. Ü. Schmidhuber, “Modeling attacks on physical unclonable functions,” Proc. 17th ACM Conf. Comput. Commun. Secur. - CCS ’10, p. 237, 2010. March 2015 - Newcastle Upon Tyne, UK 17