{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T00:02:24Z","timestamp":1771027344026,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,4,25]],"date-time":"2016-04-25T00:00:00Z","timestamp":1461542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1441757"],"award-info":[{"award-number":["CNS-1441757"]}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"crossref","award":["#2442.001"],"award-info":[{"award-number":["#2442.001"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2017,1,31]]},"abstract":"<jats:p>We propose spintronic physically unclonable functions (PUFs) to exploit security-specific properties of domain wall memory (DWM) for security, trust, and authentication. We note that the nonlinear dynamics of domain walls (DWs) in the physical magnetic system is an untapped source of entropy that can be leveraged for hardware security. The spatial and temporal randomness in the physical system is employed in conjunction with microscopic and macroscopic properties such as stochastic DW motion, stochastic pinning\/depinning, and serial access to realize novel relay-PUF and memory-PUF designs. The proposed PUFs show promising results (\u223c50% interdie Hamming distance (HD) and 10% to 20% intradie HD) in terms of randomness, stability, and resistance to attacks. We have investigated noninvasive attacks, such as machine learning and magnetic field attack, and have assessed the PUFs resilience.<\/jats:p>","DOI":"10.1145\/2809781","type":"journal-article","created":{"date-parts":[[2016,4,25]],"date-time":"2016-04-25T19:51:13Z","timestamp":1461613873000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Spintronic PUFs for Security, Trust, and Authentication"],"prefix":"10.1145","volume":"13","author":[{"given":"Anirudh","family":"Iyengar","sequence":"first","affiliation":[{"name":"University of South Florida, FL, U.S.A"}]},{"given":"Swaroop","family":"Ghosh","sequence":"additional","affiliation":[{"name":"University of South Florida, FL, U.S.A"}]},{"given":"Kenneth","family":"Ramclam","sequence":"additional","affiliation":[{"name":"University of South Florida, FL, U.S.A"}]},{"given":"Jae-Won","family":"Jang","sequence":"additional","affiliation":[{"name":"University of South Florida, FL, U.S.A"}]},{"given":"Cheng-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"University of South Florida, FL, U.S.A"}]}],"member":"320","published-online":{"date-parts":[[2016,4,25]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558671"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1070\/PU1992v035n07ABEH002248"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2011.6131604"},{"key":"e_1_2_1_4_1","unstructured":"ASU. 2007. Predictive Technology Model. Retrieved from http:\/\/ptm.asu.edu\/.  ASU. 2007. Predictive Technology Model. Retrieved from http:\/\/ptm.asu.edu\/."},{"key":"e_1_2_1_5_1","volume-title":"Introduction to Spintronics","author":"Bandyopadhyay Supriyo","unstructured":"Supriyo Bandyopadhyay and Marc Cahay . 2008. Introduction to Spintronics . CRC Press , Boca Raton, FL . Supriyo Bandyopadhyay and Marc Cahay. 2008. Introduction to Spintronics. CRC Press, Boca Raton, FL."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/nnano.2010.31"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.333530"},{"key":"e_1_2_1_8_1","unstructured":"M. J. Donahue and D. G. Porter. 1999. OOMMF User's Guide. US Department of Commerce Technology Administration National Institute of Standards and Technology.  M. J. Donahue and D. G. Porter. 1999. OOMMF User's Guide. US Department of Commerce Technology Administration National Institute of Standards and Technology."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the Non-volatile Memories Workshop.","author":"Driskill-Smith A.","year":"2010","unstructured":"A. Driskill-Smith . 2010 . Latest advances and future prospects of STT-RAM . In Proceedings of the Non-volatile Memories Workshop. A. Driskill-Smith. 2010. Latest advances and future prospects of STT-RAM. In Proceedings of the Non-volatile Memories Workshop."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.056605"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.334524"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"D. G. Hermann and J. P. Nguenang. 2013. Chaos Appearance during Domain Wall Motion under Electronic Transfer in Nanomagnets.  D. G. Hermann and J. P. Nguenang. 2013. Chaos Appearance during Domain Wall Motion under Electronic Transfer in Nanomagnets.","DOI":"10.4236\/wjcmp.2013.33022"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 154--159","author":"Iyengar A.","unstructured":"A. Iyengar , K. Ramclam , and S. Ghosh . 2014. DWM-PUF: A low-overhead, memory-based security primitive . In Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 154--159 . A. Iyengar, K. Ramclam, and S. Ghosh. 2014. DWM-PUF: A low-overhead, memory-based security primitive. In Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 154--159."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2015.2398232"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744909"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/14\/3\/033010"},{"key":"e_1_2_1_20_1","unstructured":"B. Jun and P. Kocher. 1999. The Intel Random Number Generator. Cryptography Research Inc. White Paper.  B. Jun and P. Kocher. 1999. The Intel Random Number Generator. Cryptography Research Inc. White Paper."},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 94--99","author":"Maiti A.","unstructured":"A. Maiti , J. Casarona , L. McHale , and P. Schaumont . 2010. A large scale characterization of RO-PUF . In Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 94--99 . A. Maiti, J. Casarona, L. McHale, and P. Schaumont. 2010. A large scale characterization of RO-PUF. In Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 94--99."},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 2011 Symposium on VLSI Circuits (VLSIC). IEEE, 300--301","author":"Nebashi R.","year":"2011","unstructured":"R. Nebashi , N. Sakimura , Y. Tsuji , S. Fukami , H. Honjo , S. Saito , 2011 . A content addressable memory using magnetic domain wall motion cells . In Proceedings of the 2011 Symposium on VLSI Circuits (VLSIC). IEEE, 300--301 . R. Nebashi, N. Sakimura, Y. Tsuji, S. Fukami, H. Honjo, S. Saito, et al. 2011. A content addressable memory using magnetic domain wall motion cells. In Proceedings of the 2011 Symposium on VLSI Circuits (VLSIC). IEEE, 300--301."},{"key":"e_1_2_1_23_1","unstructured":"D. Nikonov and G. Bourianoff. 2006. Taxonomy of spintronics (a zoo of devices). Retrieved from http:\/\/nanohub.org\/resources\/1940.  D. Nikonov and G. Bourianoff. 2006. Taxonomy of spintronics (a zoo of devices). Retrieved from http:\/\/nanohub.org\/resources\/1940."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.364477"},{"key":"e_1_2_1_25_1","volume-title":"Chaos in Dynamical Systems","author":"Ott E.","unstructured":"E. Ott . 2002. Chaos in Dynamical Systems . Cambridge University Press . E. Ott. 2002. Chaos in Dynamical Systems. Cambridge University Press."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.54"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"S. S. Parkin M. Hayashi and L. Thomas. 2008. Magnetic domain-wall racetrack memory. Science 320 5873 190--194.  S. S. Parkin M. Hayashi and L. Thomas. 2008. Magnetic domain-wall racetrack memory. Science 320 5873 190--194.","DOI":"10.1126\/science.1145799"},{"key":"e_1_2_1_29_1","first-page":"575","article-title":"Nanoelectronic solutions for hardware security","volume":"2012","author":"Rajendran J.","year":"2012","unstructured":"J. Rajendran , R. Karri , J. B. Wendt , M. Potkonjak , N. R. McDonald , G. S. Rose , and B. T. Wysocki . 2012 . Nanoelectronic solutions for hardware security . IACR Cryptology Eprint Archive 2012 , 575 . J. Rajendran, R. Karri, J. B. Wendt, M. Potkonjak, N. R. McDonald, G. S. Rose, and B. T. Wysocki. 2012. Nanoelectronic solutions for hardware security. IACR Cryptology Eprint Archive 2012, 575.","journal-title":"IACR Cryptology Eprint Archive"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"G. S. Rose D. Kudithipudi G. Khedkar N. McDonald B. Wysocki and L. K. Yan. 2014. Nanoelectronics and hardware security. In Network Science and Cybersecurity. Springer New York 105--123.  G. S. Rose D. Kudithipudi G. Khedkar N. McDonald B. Wysocki and L. K. Yan. 2014. Nanoelectronics and hardware security. In Network Science and Cybersecurity. Springer New York 105--123.","DOI":"10.1007\/978-1-4614-7597-2_7"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the International Conference on Computer-Aided Design. IEEE Press, 819--823","author":"Rostami M.","unstructured":"M. Rostami , F. Koushanfar , J. Rajendran , and R. Karri . 2013. (November). Hardware security: Threat models and metrics . In Proceedings of the International Conference on Computer-Aided Design. IEEE Press, 819--823 . M. Rostami, F. Koushanfar, J. Rajendran, and R. Karri. 2013. (November). Hardware security: Threat models and metrics. In Proceedings of the International Conference on Computer-Aided Design. IEEE Press, 819--823."},{"key":"e_1_2_1_32_1","unstructured":"Samsung. 2013. SGMI Research Themes & Subjects. Online: http:\/\/www.samsung.com\/global\/business\/semiconductor\/html\/news-events\/file\/SGMI_Proposal_Guide_and_Format_R1.pdf.  Samsung. 2013. SGMI Research Themes & Subjects. Online: http:\/\/www.samsung.com\/global\/business\/semiconductor\/html\/news-events\/file\/SGMI_Proposal_Guide_and_Format_R1.pdf."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1143\/JJAP.50.04DM01"},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"A. Thiaville and Y. Nakatani. 2006. Domain-wall dynamics in nanowiresand nanostrips. In Spin Dynamics in Confined Magnetic Structures III. Springer Berlin 161--205.  A. Thiaville and Y. Nakatani. 2006. Domain-wall dynamics in nanowiresand nanostrips. In Spin Dynamics in Confined Magnetic Structures III. Springer Berlin 161--205.","DOI":"10.1007\/10938171_5"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_29"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"S. X. Wang and A. M. Taratorin. 1999. Magnetic Information Storage Technology: A Volume in the Electromagnetism Series. Academic Press.  S. X. Wang and A. M. Taratorin. 1999. Magnetic Information Storage Technology: A Volume in the Electromagnetism Series. Academic Press.","DOI":"10.1016\/B978-012734570-3\/50020-0"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.12"},{"key":"e_1_2_1_39_1","volume-title":"Spintronics: A spin-based electronics vision for the future. Science 294, 5546, 1488--1495.","author":"Wolf S. A.","year":"2001","unstructured":"S. A. Wolf , D. D. Awschalom , R. A. Buhrman , J. M. Daughton , S. Von Molnar , M. L. Roukes , 2001 . Spintronics: A spin-based electronics vision for the future. Science 294, 5546, 1488--1495. S. A. Wolf, D. D. Awschalom, R. A. Buhrman, J. M. Daughton, S. Von Molnar, M. L. Roukes, et al. 2001. Spintronics: A spin-based electronics vision for the future. Science 294, 5546, 1488--1495."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/nnano.2014.324"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.93.256602"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 626--631","author":"Zheng Y.","unstructured":"Y. Zheng , A. R. Krishna , and S. Bhunia . 2013. (January). ScanPUF: Robust ultralow-overhead PUF using scan chain . In Proceedings of the 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 626--631 . Y. Zheng, A. R. Krishna, and S. Bhunia. 2013. (January). ScanPUF: Robust ultralow-overhead PUF using scan chain. In Proceedings of the 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 626--631."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.76.323"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2809781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2809781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:42:54Z","timestamp":1750225374000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2809781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,25]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1,31]]}},"alternative-id":["10.1145\/2809781"],"URL":"https:\/\/doi.org\/10.1145\/2809781","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"value":"1550-4832","type":"print"},{"value":"1550-4840","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,25]]},"assertion":[{"value":"2014-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}