Lightweight hardware fingerprinting solution using inherent memory in off-the-shelf commodity devices
نویسندگان
چکیده
An emerging technology known as Physical unclonable function (PUF) can provide a hardware root-of-trust in building the trusted computing system. PUF exploits intrinsic process variations during integrated circuit (IC) fabrication to generate unique response. This response differs from one other similar type of PUFs. Static random-access memory (SRAM-PUF) is memory-based PUFs which generated power-up process. Non-volatile (NVM) architecture like SRAM available off-the-shelf microcontroller devices. Exploiting inherent could wide-spread adoption PUF. Therefore, this study, we evaluate suitability ATMega2560 on Arduino platform that fingerprint. First, analyze start-up values (SUVs) cells and select only show random after Subsequently, statistically characteristic fifteen SRAM-PUFs include uniqueness, reliability, uniformity. Based our findings, SUVs on-chip SRAMs achieve 42.64% 97.28% 69.16% concluded commodity has good quality be used
منابع مشابه
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs
This paper presents a lightweight anti-counterfeiting solution using intrinsic Physically Unclonable Functions (PUFs), which are already embedded in most commodity hardware platforms. The presented solution is particularly suitable for low-end computing devices without on-board security features. Our anti-counterfeiting approach is based on extracting a unique fingerprint for individual devices...
متن کاملFingerprinting IEEE 802.15.4 Devices with Commodity Radios
We present a reliable method of PHY-layer fingerprinting of IEEE 802.15.4-conformant nodes with commodity digital radio chips widely used in building inexpensive IEEE 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they can fingerprint; our method does not require a software-defined radio and use...
متن کاملLightweight Symbolic Verification of Graph Transformation Systems with Off-the-Shelf Hardware Model Checkers
We present a novel symbolic bounded model checking approach to test reachability properties of model-driven implementations of software. Given a concrete initial state of a software system, a type graph and, respectively, a set of graph transformations describing the system’s structure and, respectively, behavior, the reachability properties are expressed in terms of graph constraints. Without ...
متن کاملRelaying EMV Contactless Transactions using Off-The-Shelf Android Devices
Dutch banks introduced contactless payments in April 2014, and have been promoting the use of contactless cards since then. Contactless payments are based on the EMV specification, the worldwide standard for contact and contactless transactions. EMV Contact is a well-researched field and many vulnerabilities have been found. Although EMV Contactless is newer and less researched, a few vulnerabi...
متن کاملHardware Fingerprinting Using HTML5
Device fingerprinting over the web has received much attention both by the research community and the commercial market a like. Almost all the fingerprinting features proposed to date depend on software run on the device. All of these features can be changed by the user, thereby thwarting the device’s fingerprint. In this position paper we argue that the recent emergence of the HTML5 standard g...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v25.i1.pp105-112