Physical Unclonable Functions (PUFs) and Hardware Security
Modern integrated circuits are manufactured across global supply chains that introduce opportunities for tampering, counterfeiting, and covert modification long before a chip reaches its intended application. Hardware security researchers study how to detect and prevent these threats—using techniques like Physical Unclonable Functions, which exploit nanoscale manufacturing variation to give each chip a unique, unclonable identity, and logic encryption, which obscures a circuit's function from anyone who lacks a secret key. A persistent challenge is that many proposed defenses, including PUF-based authentication schemes, have proven vulnerable to machine learning attacks that model a device's behavior from observed input-output pairs. Active work focuses on making these primitives more resilient to modeling, understanding how scan chains and other test interfaces leak sensitive information, and developing verification methods that can confirm a chip has not been silently altered during fabrication or distribution.
- Works
- 21,862
- Total citations
- 227,084
- Keywords
- Physical Unclonable FunctionsHardware TrojansLogic EncryptionFPGA SecurityAnti-CounterfeitingPUF-Based Authentication
Top papers in Physical Unclonable Functions (PUFs) and Hardware Security
Ordered by total citation count.
- Differential Power Analysis↗ 7,206
- Correlation Power Analysis with a Leakage Model↗ 2,454
- Quantization index modulation: a class of provably good methods for digital watermarking and information embedding↗ 2,083
- Physical unclonable functions for device authentication and secret key generation↗ 2,076
- Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey↗ 2,021OA
- Adversarial Examples in the Physical World↗ 1,852OA
- Examining smart-card security under the threat of power analysis attacks↗ 1,692
- Silicon physical random functions↗ 1,630
- A Survey of Hardware Trojan Taxonomy and Detection↗ 1,368
- Physical Unclonable Functions and Applications: A Tutorial↗ 1,285OA
- The geometry of innocent flesh on the bone↗ 1,275
- Electromagnetic Analysis: Concrete Results↗ 1,273
Active researchers
Top authors in this area, ranked by h-index.