{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T06:24:00Z","timestamp":1772778240862,"version":"3.50.1"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000144","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1850241"],"award-info":[{"award-number":["CNS-1850241"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tifs.2021.3101045","type":"journal-article","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T20:04:18Z","timestamp":1627675458000},"page":"4035-4049","source":"Crossref","is-referenced-by-count":29,"title":["Memory-Based PUFs are Vulnerable as Well: A Non-Invasive Attack Against SRAM PUFs"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6388-0509","authenticated-orcid":false,"given":"B. M. S.","family":"Bahar Talukder","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5510-6193","authenticated-orcid":false,"given":"Farah","family":"Ferdaus","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0010-6388","authenticated-orcid":false,"given":"Md Tauhidur","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","author":"ehlig","year":"2017","journal-title":"Error Detection in SRAM"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/DELTA.2002.994601"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300014980"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/4.192045"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2015.7085443"},{"key":"ref39","first-page":"245","author":"maiti","year":"2013","journal-title":"A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855578"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494884"},{"key":"ref78","first-page":"25","article-title":"Reverse engineering of CMOS integrated circuits","volume":"88","author":"masalskis","year":"2008","journal-title":"Elektronika ir Elektrotechnika"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2755563"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_10"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2984751"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_24"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.25"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-020-00223-w"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778915"},{"key":"ref60","first-page":"762","article-title":"On the relation between distance distributions of binary block codes and the binomial distribution","volume":"50","author":"kalouti","year":"1995","journal-title":"Annales des T&#x00E9;l&#x00E9;communications"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176696"},{"key":"ref61","first-page":"762","author":"boas","year":"2005","journal-title":"Mathematical Methods in the Physical Sciences"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2425296.2425300"},{"key":"ref28","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Proc 44th ACM\/IEEE Design Autom Conf"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372589"},{"key":"ref65","first-page":"111","article-title":"Towards the avoidance of counterfeit memory: Identifying the DRAM origin","author":"talukder","year":"2020","journal-title":"Proc IEEE Int Symp Hardw Oriented Secur Trust (HOST)"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(00)00016-3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2017.2713305"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2013.12"},{"key":"ref68","year":"2020","journal-title":"Arduino Due"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224314"},{"key":"ref2","article-title":"Initial SRAM state as a fingerprint and source of true random numbers for RFID tags","author":"holcomb","year":"2007","journal-title":"Proc Conf RFID Secur"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2968455.2968519"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2018.00102"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297289"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512534"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.68"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581556"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2014.2361721"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651901"},{"key":"ref59","article-title":"Electronic authentication guideline","author":"burr","year":"2017"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/18.79914"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/18.79926"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865541"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835978"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1165573.1165636"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/OIC.2017.7965506"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2010.2089568"},{"key":"ref10","year":"2018","journal-title":"Developing Tamper-Resistant Designs with Zynq UltraScale+ Devices"},{"key":"ref11","article-title":"Physical unclonable functions to the rescue","author":"schrijen","year":"2018","journal-title":"Proc Embedded World"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0012-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1063\/1.5079407"},{"key":"ref15","first-page":"1","article-title":"PUFs at a glance","author":"r\u00fchrmair","year":"2014","journal-title":"Proc Design Autom Test Eur Conf Exhibition (DATE)"},{"key":"ref16","first-page":"1","article-title":"Protocol attacks on advanced PUF protocols and countermeasures","author":"dijk","year":"2014","journal-title":"Proc Design Autom Test Eur Conf Exhibition (DATE)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.27"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711445"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/6.880953"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS.2016.7574590"},{"key":"ref6","year":"2016","journal-title":"Using SRAM PUF System Service in SmartFusion2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923174"},{"key":"ref8","author":"lu","year":"2020","journal-title":"Secure device manager for Intel R Stratix 10 devices provides fpga and soc security"},{"key":"ref7","year":"2019","journal-title":"LPC55Sxx Usage of the PUF and Hash Crypt to AES Coding"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2014.43"},{"key":"ref9","year":"2020","journal-title":"Protecting a Device&#x2019;s Root Secrets With SRAM PUF"},{"key":"ref46","first-page":"382","article-title":"A single-power-supply 0.7V 1 GHz 45 nm SRAM with an asymmetrical unit-&#x00DF;-ratio memory cell","author":"kawasumi","year":"2008","journal-title":"IEEE Int Solid-State Circuits Conf Dig Tech Papers"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2011.2169678"},{"key":"ref48","first-page":"817","article-title":"A general framework for spatial correlation modeling in VLSI design","author":"liu","year":"2007","journal-title":"Proc 44th ACM\/IEEE Design Autom Conf"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.25103\/jestr.095.23"},{"key":"ref42","first-page":"1","article-title":"A comparative analysis of 6T, 7T, 8T and 9T SRAM cells in 90 nm technology","author":"premalatha","year":"2015","journal-title":"Proc IEEE Int Conf Electr Comput Commun Technol (ICECCT)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s19143208"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.123"},{"key":"ref43","first-page":"1","article-title":"Comparison on 6T, 5T and 4T SRAM cell using 22 nm technology","author":"rollini","year":"2017","journal-title":"Proc IEEE Int Conf Electr Instrum Commun Eng (ICEICE)"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/10206\/9151439\/9502078-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9151439\/09502078.pdf?arnumber=9502078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:41Z","timestamp":1652194361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9502078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/tifs.2021.3101045","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}