{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:08:20Z","timestamp":1759147700389,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/percomw.2016.7457156","type":"proceedings-article","created":{"date-parts":[[2016,4,21]],"date-time":"2016-04-21T20:24:49Z","timestamp":1461270289000},"page":"1-6","source":"Crossref","is-referenced-by-count":15,"title":["Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Huth","sequence":"first","affiliation":[]},{"given":"Paul","family":"Duplys","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Guneysu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"Apple HomeKit"},{"key":"ref11","article-title":"An operating system for the home","author":"dixon","year":"2012","journal-title":"NSDI USENIX"},{"year":"0","key":"ref12","article-title":"QIVICON - living in a smart home"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2015.7116721"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322286"},{"journal-title":"FPGA Intrinsic PUFs and Their Use for IP Protection","year":"2007","author":"guajardo","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_8"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/11496137_28","article-title":"Robust key extraction from physical uncloneable functions","author":"skoric","year":"2005","journal-title":"Applied Cryptography and Network Security"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-642-33027-8_17","article-title":"PUFs: Myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon","author":"katzenbeisser","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2012"},{"key":"ref19","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Proceedings of the 44th Annual Design Automation Conference ACM"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2014.6881436"},{"key":"ref3","article-title":"A business model type for the Internet of things","author":"turber","year":"2014","journal-title":"22st European Conference on Information Systems ECIS 2014 Tel Aviv Israel June 9&#x2013;11 2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref29","first-page":"255","article-title":"SIMPL systems: On a public key variant of physical unclonable functions","volume":"2009","author":"r\u00fchrmair","year":"2009","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_39"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref2","article-title":"Gartner's hype cycle special report for 2014","author":"burton","year":"2014","journal-title":"Gartner Inc Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77090-9_12"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_3"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/CSAC.2002.1176287","article-title":"Controlled physical random functions","author":"gassend","year":"2002","journal-title":"Computer Security Applications Conference 2002 Proceedings 18th Annual"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13869-0_2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"article-title":"Remote attestation mechanism for embedded devices based on physical unclonable functions","year":"2013","author":"markantonakis","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LightSec.2011.8"}],"event":{"name":"2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","start":{"date-parts":[[2016,3,14]]},"location":"Sydney, Australia","end":{"date-parts":[[2016,3,18]]}},"container-title":["2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7452853\/7457013\/7457156.pdf?arnumber=7457156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T11:30:39Z","timestamp":1498303839000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7457156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/percomw.2016.7457156","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}