A puf taxonomy

T McGrath, IE Bagci, ZM Wang, U Roedig… - Applied physics …, 2019 - pubs.aip.org
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …

Rowhammer: A retrospective

O Mutlu, JS Kim - … Transactions on Computer-Aided Design of …, 2019 - ieeexplore.ieee.org
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …

The DRAM latency PUF: Quickly evaluating physical unclonable functions by exploiting the latency-reliability tradeoff in modern commodity DRAM devices

JS Kim, M Patel, H Hassan… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are commonly used in cryptography to identify
devices based on the uniqueness of their physical microstructures. DRAM-based PUFs have …

Generating robust dnn with resistance to bit-flip based adversarial weight attack

L Liu, Y Guo, Y Cheng, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Rowhammer Attack, a new DRAM-based attack, was developed exploiting weak cells to
alter their content. Such attacks can be launched at the user level without requiring access …

Guardion: Practical mitigation of dma-based rowhammer attacks on arm

V Van der Veen, M Lindorfer, Y Fratantonio… - Detection of Intrusions …, 2018 - Springer
Over the last two years, the Rowhammer bug transformed from a hard-to-exploit DRAM
disturbance error into a fully weaponized attack vector. Researchers demonstrated exploits …

An overview of DRAM-based security primitives

NA Anagnostopoulos, S Katzenbeisser, J Chandy… - Cryptography, 2018 - mdpi.com
Recent developments have increased the demand for adequate security solutions, based on
primitives that cannot be easily manipulated or altered, such as hardware-based primitives …

T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT

K Lounis, M Zulkernine - IEEE Access, 2021 - ieeexplore.ieee.org
As security has always been an afterthought of innovation, the security of IoT (Internet of
Things), in general, and authentication, in particular, has become a serious research …

D2D-MAP: A drone to drone authentication protocol using physical unclonable functions

K Lounis, SHH Ding… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the continuous miniaturization of electronic devices and the recent advancements in
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …

SpyHammer: Using RowHammer to remotely spy on temperature

L Orosa, U Rührmair, AG Yaglikci, H Luo… - arXiv preprint arXiv …, 2022 - arxiv.org
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row by just
accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate …

Codic: A low-cost substrate for enabling custom in-dram functionalities and optimizations

L Orosa, Y Wang, M Sadrosadati, JS Kim… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
DRAM is the dominant main memory technology used in modern computing systems.
Computing systems implement a memory controller that interfaces with DRAM via DRAM …