{"id":"https://openalex.org/W2127937010","doi":"https://doi.org/10.1109/ahs.2013.6604236","title":"Combined HW-SW adaptive clone-resistant functions as physical security anchors","display_name":"Combined HW-SW adaptive clone-resistant functions as physical security anchors","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2127937010","doi":"https://doi.org/10.1109/ahs.2013.6604236","mag":"2127937010"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ahs.2013.6604236","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044241451","display_name":"Marc Fyrbiak","orcid":"https://orcid.org/0000-0002-4266-7108"},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"M. Fyrbiak","raw_affiliation_strings":["Inst. of Comput. & Network Eng., Tech. Univ. Braunschweig, Braunschweig, Germany"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. & Network Eng., Tech. Univ. Braunschweig, Braunschweig, Germany","institution_ids":["https://openalex.org/I94509681"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086672265","display_name":"Christian Kison","orcid":"https://orcid.org/0000-0002-5830-7692"},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"C. Kison","raw_affiliation_strings":["Inst. of Comput. & Network Eng., Tech. Univ. Braunschweig, Braunschweig, Germany"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. & Network Eng., Tech. Univ. Braunschweig, Braunschweig, Germany","institution_ids":["https://openalex.org/I94509681"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046206098","display_name":"M. Jeske","orcid":null},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"M. Jeske","raw_affiliation_strings":["Inst. of Comput. & Network Eng., Tech. Univ. Braunschweig, Braunschweig, Germany"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. & Network Eng., Tech. Univ. Braunschweig, Braunschweig, Germany","institution_ids":["https://openalex.org/I94509681"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111986370","display_name":"W. Adi","orcid":null},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"W. Adi","raw_affiliation_strings":["Inst. of Comput. & Network Eng., Tech. Univ. Braunschweig, Braunschweig, Germany"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. & Network Eng., Tech. Univ. Braunschweig, Braunschweig, Germany","institution_ids":["https://openalex.org/I94509681"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.474,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":14,"citation_normalized_percentile":{"value":0.70268,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"130","last_page":"137"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.60425067},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness","score":0.56984425},{"id":"https://openalex.org/keywords/gate-array","display_name":"Gate array","score":0.47777474},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.44307488}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.73334146},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6393368},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.60425067},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.58271205},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.56984425},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.51831686},{"id":"https://openalex.org/C114237110","wikidata":"https://www.wikidata.org/wiki/Q114901","display_name":"Gate array","level":3,"score":0.47777474},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.45633405},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.44307488},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42245764},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2464492},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11483985},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08886039},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ahs.2013.6604236","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":43,"referenced_works":["https://openalex.org/W109683393","https://openalex.org/W112080296","https://openalex.org/W1490557050","https://openalex.org/W1515200869","https://openalex.org/W1591620981","https://openalex.org/W1599175145","https://openalex.org/W1602765425","https://openalex.org/W163558546","https://openalex.org/W1811921100","https://openalex.org/W1827849520","https://openalex.org/W1894646615","https://openalex.org/W1963105592","https://openalex.org/W2000171858","https://openalex.org/W2021911310","https://openalex.org/W2080284304","https://openalex.org/W2095521256","https://openalex.org/W2096434182","https://openalex.org/W2107217398","https://openalex.org/W2123482651","https://openalex.org/W2123841788","https://openalex.org/W2129373063","https://openalex.org/W2129830285","https://openalex.org/W2130351941","https://openalex.org/W2137396645","https://openalex.org/W2141648124","https://openalex.org/W2146813141","https://openalex.org/W2153476158","https://openalex.org/W2169212403","https://openalex.org/W2171899543","https://openalex.org/W2172255798","https://openalex.org/W2174648984","https://openalex.org/W2199322517","https://openalex.org/W2225497109","https://openalex.org/W2464729570","https://openalex.org/W25365497","https://openalex.org/W2570008916","https://openalex.org/W2725380599","https://openalex.org/W2902150835","https://openalex.org/W3111526966","https://openalex.org/W3124308571","https://openalex.org/W3147534920","https://openalex.org/W4249254260","https://openalex.org/W64524655"],"related_works":["https://openalex.org/W4292862360","https://openalex.org/W4234974809","https://openalex.org/W3148339641","https://openalex.org/W3094096662","https://openalex.org/W3083074270","https://openalex.org/W3081452067","https://openalex.org/W3018478474","https://openalex.org/W2910831494","https://openalex.org/W2896245892","https://openalex.org/W2184096640"],"abstract_inverted_index":{"Modern":[0,117],"resilient":[1],"security":[2,18,34,284],"systems":[3],"require":[4],"a":[5,74,84,91,109,176,258,281,287],"hard":[6,110,231],"to":[7,46,65,111,130,154,185,232,237,254],"clone":[8,238],"physical":[9,32],"module":[10],"integrated":[11],"in":[12,26,48,90,128,171],"core":[13],"system":[14,205,265],"units":[15,41],"as":[16,30,39,53],"basic":[17],"anchors.":[19,35],"Physical":[20],"Unclonable":[21],"Functions":[22],"(PUFs)":[23],"were":[24],"introduced":[25],"the":[27,49,218,263],"last":[28],"decade":[29],"possible":[31,60],"unclonable":[33],"So":[36],"far,":[37],"PUFs":[38],"analog":[40],"exhibited":[42],"relative":[43],"inconsistency":[44],"due":[45],"variations":[47],"operating":[50],"conditions":[51,157],"such":[52],"temperature,":[54],"supply":[55],"voltage,":[56],"aging":[57,159],"and":[58,158,181,189,212,230,269],"other":[59],"environmental":[61],"effects.":[62],"This":[63,71],"lead":[64],"relatively":[66],"high":[67],"unit's":[68],"implementation":[69],"complexity.":[70],"work":[72],"introduces":[73],"consistent":[75],"pure-digital":[76,148],"PUF":[77,82,145,224],"concept.":[78],"The":[79,95,273],"proposed":[80,219,264,275],"digital":[81,114,144,223,241],"is":[83,98,168,183,201,206,247],"combined":[85,113,135],"Hardware-Software":[86],"(HW-SW)":[87],"module,":[88],"embedded":[89,126],"System-on-Chip":[92],"(SoC)":[93],"device.":[94],"key":[96],"idea":[97],"based":[99],"on":[100,262],"triggering":[101],"an":[102,243],"internal":[103],"true":[104],"random":[105],"process,":[106],"which":[107],"creates":[108],"predict":[112,233],"HW-SW":[115,137],"module.":[116],"Field":[118],"Programmable":[119],"Gate":[120],"Array":[121],"(FPGA)":[122],"SoC-devices":[123],"often":[124],"incorporate":[125],"processors":[127],"addition":[129],"self-reconfiguring":[131,136,172],"hardware":[132,180],"cell-arrays.":[133],"Such":[134],"architectures":[138,167],"allow":[139,186],"practical":[140,282],"self-creation":[141,164],"of":[142,165,178,290],"clone-resistant":[143],"modules.":[146],"As":[147,257],"units,":[149],"they":[150],"exhibit":[151],"negligible":[152],"sensitivity":[153],"both":[155,179],"operation":[156],"factors.":[160],"We":[161],"postulate":[162],"that":[163,203,250],"pure-hardware":[166],"highly":[169],"complex":[170],"FPGA":[173],"environment.":[174],"Therefore":[175],"combination":[177],"software":[182],"expected":[184],"more":[187],"sophisticated":[188],"secure":[190],"functions":[191],"with":[192,226],"higher":[193],"robustness":[194],"against":[195],"Side":[196],"Channel":[197],"Attacks":[198],"(SCAs).":[199],"It":[200],"assumed":[202],"any":[204,239],"basically":[207],"clonable,":[208],"if":[209],"sufficient":[210],"financial":[211],"technical":[213],"investments":[214],"are":[215,266],"offered.":[216],"In":[217,249],"concept,":[220],"each":[221],"created":[222],"results":[225],"its":[227],"own":[228],"unknown":[229],"individual":[234,244],"structure.":[235],"Therefore,":[236],"single":[240],"PUF,":[242],"attack":[245],"procedure":[246],"needed.":[248],"case,":[251],"mass-cloning":[252],"tends":[253],"become":[255],"impractical.":[256],"result,":[259],"cloning":[260],"attacks":[261],"not":[267],"economic":[268],"hence":[270],"practically":[271],"useless.":[272],"resulting":[274],"system,":[276],"when":[277],"adequately":[278],"implemented,":[279],"offers":[280],"low-cost":[283],"anchor":[285],"for":[286],"large":[288],"class":[289],"modern":[291],"applications.":[292]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2127937010","counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2024-12-13T11:41:42.075345","created_date":"2016-06-24"}