{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:57:09Z","timestamp":1760241429730,"version":"build-2065373602"},"reference-count":98,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T00:00:00Z","timestamp":1522195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"DFG (Deutsche Forschungsgemeinschaft; German Research Foundation)","award":["project P3 within the CRC (Collaborative Research Center) 1119 CROSSING"],"award-info":[{"award-number":["project P3 within the CRC (Collaborative Research Center) 1119 CROSSING"]}]},{"name":"Comcast Corporation, a company headquartered in Philadelphia, PA, USA"},{"name":"Honeywell International Inc., a company headquarted in Morris Plains, NJ, USA"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM) can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet of Things (IoT), as DRAMs are an intrinsic part of most contemporary computer systems. In this work, we present a comprehensive overview of the literature regarding DRAM-based security primitives and an extended classification of it, based on a number of different criteria. In particular, first, we demonstrate the way in which DRAMs work and present the characteristics being exploited for the implementation of security primitives. Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs), and present the applications of each of the two types of DRAM-based security primitives. We additionally proceed to assess the security such primitives can provide, by discussing potential attacks and defences, as well as the proposed security metrics. Subsequently, we also compare these primitives to other hardware-based security primitives, noting their advantages and shortcomings, and proceed to demonstrate their potential for commercial adoption. Finally, we analyse our classification methodology, by reviewing the criteria employed in our classification and examining their significance.<\/jats:p>","DOI":"10.3390\/cryptography2020007","type":"journal-article","created":{"date-parts":[[2018,3,29]],"date-time":"2018-03-29T05:26:37Z","timestamp":1522301197000},"page":"7","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["An Overview of DRAM-Based Security Primitives"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0243-8594","authenticated-orcid":false,"given":"Nikolaos","family":"Anagnostopoulos","sequence":"first","affiliation":[{"name":"Computer Science Department, Technical University of Darmstadt, Mornewegstra\u00dfe 32, S4|14, 64293 Darmstadt, Germany"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"Computer Science Department, Technical University of Darmstadt, Mornewegstra\u00dfe 32, S4|14, 64293 Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3449-3205","authenticated-orcid":false,"given":"John","family":"Chandy","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Connecticut, 371 Fairfield Way, U-4157, Storrs, CT 06269-4157, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8410-4306","authenticated-orcid":false,"given":"Fatemeh","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"School of Engineering, San Francisco State University, 1600 Holloway Avenue, San Francisco, CA 94132, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,3,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MSP.2013.90","article-title":"Making Sense from Snowden: What\u2019s Significant in the NSA Surveillance Revelations","volume":"11","author":"Landau","year":"2013","journal-title":"IEEE Secur. Priv."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Kocaba\u015f, \u00dc., Ro\u017ei\u0107, V., Sadeghi, A.R., Verbauwhede, I., and Wachsmann, C. (2012). PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-642-33027-8_17"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1109\/TVLSI.2016.2606658","article-title":"DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication","volume":"25","author":"Tehranipoor","year":"2017","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Xiong, W., Schaller, A., Anagnostopoulos, N.A., Saleem, M.U., Gabmeyer, S., Katzenbeisser, S., and Szefer, J. (2016). Run-Time Accessible DRAM PUFs in Commodity Devices. International Conference on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-662-53140-2_21"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Schaller, A., Xiong, W., Anagnostopoulos, N.A., Saleem, M.U., Gabmeyer, S., Katzenbeisser, S., and Szefer, J. (2017, January 1\u20135). Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security. Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2017.7951729"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Prabhu, P., Akel, A., Grupp, L.M., Wing-Kei, S.Y., Suh, G.E., Kan, E., and Swanson, S. (2011). Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations. International Conference on Trust and Trustworthy Computing, Springer.","DOI":"10.1007\/978-3-642-21599-5_14"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Hassan, Q.F., Khan, A.R., and Madani, S.A. (2017). Exploring Methods of Authentication for the Internet of Things. Internet of Things: Challenges, Advances, and Applications, CRC Press.","DOI":"10.1201\/9781315155005"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/2508148.2485928","article-title":"An Experimental Study of Data Retention Behavior in Modern DRAM Devices: Implications for Retention Time Profiling Mechanisms","volume":"Volume 41","author":"Liu","year":"2013","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Keeth, B., Baker, R.J., Johnson, B., and Lin, F. (2007). DRAM Circuit Design: Fundamental and High-Speed Topics, Wiley-IEEE Press. [2nd ed.].","DOI":"10.1109\/9780470544426"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1109\/JSSC.2011.2168729","article-title":"A 667 MHz Logic-Compatible Embedded DRAM Featuring an Asymmetric 2T Gain Cell for High Speed On-Die Caches","volume":"47","author":"Chun","year":"2012","journal-title":"IEEE J. Solid State Circuits"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Tang, Q., Zhou, C., Choi, W., Kang, G., Park, J., Parhi, K.K., and Kim, C.H. (May, January 30). A DRAM Based Physical Unclonable Function Capable of Generating >1032 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication. Proceedings of the 2017 IEEE Custom Integrated Circuits Conference (CICC), Austin, TX, USA.","DOI":"10.1109\/CICC.2017.7993610"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Tehranipoor, F., Karimian, N., Xiao, K., and Chandy, J. (2015, January 20\u201322). DRAM Based Intrinsic Physical Unclonable Functions for System Level Security. Proceedings of the Great Lakes Symposium on VLSI, Pittsburgh, PA, USA.","DOI":"10.1145\/2742060.2742069"},{"key":"ref_13","unstructured":"Okamura, T., Minematsu, K., Tsunoo, Y., Iida, T., Kimura, T., and Nakamura, K. (2012). DRAM PUF (in Japanese). Proceedings of the 29th Symposium on Cryptography and Information Security (SCIS 2012), Institute of Electronics, Information and Communication Engineers."},{"key":"ref_14","unstructured":"Keller, C., Felber, N., G\u00fcrkaynak, F., Kaeslin, H., and Junod, P. (2012). Physically Unclonable Functions for Secure Hardware (poster), Nano-Tera.CH. RTD 2010\u2014QCrypt."},{"key":"ref_15","unstructured":"Felber, N. (2012). for Gisin, N. Secure High-Speed Communication Based on Quantum Key Distribution (presentation slides), Nano-Tera.CH. RTD 2010\u2014QCrypt, Annual Plenary Meeting."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Keller, C., G\u00fcrkaynak, F., Kaeslin, H., and Felber, N. (2014, January 1\u20135). Dynamic Memory-Based Physically Unclonable Function for the Generation of Unique Identifiers and True Random Numbers. Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, VIC, Australia.","DOI":"10.1109\/ISCAS.2014.6865740"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Tehranipoor, F., Yan, W., and Chandy, J.A. (2016, January 3\u20135). Robust Hardware True Random Number Generators using DRAM Remanence Effects. Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2016.7495561"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Fainstein, D., Rosenblatt, S., Cestero, A., Robson, N., Kirihata, T., and Iyer, S.S. (2012, January 13\u201315). Dynamic Intrinsic Chip ID Using 32nm High-K\/Metal Gate SOI Embedded DRAM. Proceedings of the 2012 Symposium on VLSI Circuits (VLSIC), Honolulu, HI, USA.","DOI":"10.1109\/VLSIC.2012.6243832"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sutar, S., Raha, A., Kulkarni, D., Shorey, R., Tew, J., and Raghunathan, V. (2018). D-PUF: An Intrinsically Reconfigurable DRAM PUF for Device Authentication and Random Number Generation. ACM Trans. Embed. Comput. Syst., 17.","DOI":"10.1145\/3105915"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Hashemian, M.S., Singh, B., Wolff, F., Weyer, D., Clay, S., and Papachristou, C. (2015, January 9\u201313). A Robust Authentication Methodology Using Physically Unclonable Functions in DRAM Arrays. Proceedings of the Design, Automation & Test in Europe Conference, Grenoble, France.","DOI":"10.7873\/DATE.2015.0308"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kim, J.S., Patel, M., Hassan, H., and Mutlu, O. (2018, January 24\u201328). The DRAM Latency PUF: Quickly Evaluating Physical Unclonable Functions by Exploiting the Latency-Reliability Tradeoff in Modern DRAM Devices. Proceedings of the 24th International Symposium on High-Performance Computer Architecture (HPCA), Vienna, Austria.","DOI":"10.1109\/HPCA.2018.00026"},{"key":"ref_22","unstructured":"Bauder, D.W. (1983). An Anti-Counterfeiting Concept for Currency Systems."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/0161-118491858737","article-title":"A System for Verifying User Identity and Authorization at the Point-of Sale or Access","volume":"8","author":"Simmons","year":"1984","journal-title":"Cryptologia"},{"key":"ref_24","unstructured":"Simmons, G.J. (1991, January 1\u20133). Identification of Data, Devices, Documents and Individuals. Proceedings of the 25th Annual IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan."},{"key":"ref_25","unstructured":"Pappu, R.S. (2001). Physical One-Way Functions. [Ph.D. Thesis, Massachusetts Institute of Technology]."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical One-Way Functions","volume":"297","author":"Pappu","year":"2002","journal-title":"Science"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., and Devadas, S. (2002). Silicon Physical Random Functions. Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM.","DOI":"10.1145\/586110.586132"},{"key":"ref_28","unstructured":"Gassend, B.L.P. (2003). Physical Random Functions. [Master\u2019s Thesis, Massachusetts Institute of Technology]."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., and Tuyls, P. (2007). FPGA Intrinsic PUFs and their Use for IP Protection. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref_30","unstructured":"Holcomb, D.E., Burleson, W.P., and Fu, K. (2007, January 11\u201313). Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags. Proceedings of the Conference on RFID Security, Malaga, Spain."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yan, W., Jin, C., Tehranipoor, F., and Chandy, J.A. (2017, January 4\u20138). Phase Calibrated Ring Oscillator PUF Design and Implementation on FPGAs. Proceedings of the 27th International Conference on Field Programmable Logic and Applications (FPL 2017), Ghent, East Flanders, Belgium.","DOI":"10.23919\/FPL.2017.8056859"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical Unclonable Functions and Applications: A Tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_33","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., and Devadas, S. (2004, January 17\u201319). A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications. Proceedings of the 2004 Symposium on VLSI Circuits, Digest of Technical Papers, Honolulu, HI, USA."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., and Potkonjak, M. (2008, January 28\u201330). Testing Techniques for Hardware Security. Proceedings of the 2008 IEEE International Test Conference, Santa Clara, CA, USA.","DOI":"10.1109\/TEST.2008.4700636"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., and Schmidhuber, J. (2010, January 4\u20138). Modeling Attacks on Physical Unclonable Functions. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866335"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","article-title":"PUF Modeling Attacks on Simulated and Silicon Data","volume":"8","author":"Sehnke","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Schrijen, G.J., \u0160kori\u0107, B., Van Geloven, J., Verhaegh, N., and Wolters, R. (2006). Read-Proof Hardware from Protective Coatings. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/11894063_29"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Suh, G.E., and Devadas, S. (2007, January 4\u20138). Physical Unclonable Functions for Device Authentication and Secret Key Generation. Proceedings of the 44th Annual Design Automation Conference, San Diego, CA, USA.","DOI":"10.1109\/DAC.2007.375043"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Su, Y., Holleman, J., and Otis, B. (2007, January 11\u201315). A 1.6 pJ\/bit 96% Stable Chip-ID Generating Circuit Using Process Variations. Proceedings of the Digest of Technical Papers of the 2007 IEEE International Solid-State Circuits Conference (ISSCC 2007), San Francisco, CA, USA.","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., and Potkonjak, M. (2008, January 10\u201313). Lightweight Secure PUFs. Proceedings of the 2008 IEEE\/ACM International Conference on Computer-Aided Design, San Jose, CA, USA.","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., and Tuyls, P. (2008, January 9). The Butterfly PUF Protecting IP on Every FPGA. Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), Anaheim, CA, USA.","DOI":"10.1109\/HST.2008.4559053"},{"key":"ref_42","unstructured":"Maes, R., Tuyls, P., and Verbauwhede, I. (2008, January 13\u201314). Intrinsic PUFs from Flip-Flops on Reconfigurable Devices. Proceedings of the 3rd Benelux Workshop on Information and System Security (WISSec 2008), Eindhoven, The Netherlands."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Suzuki, D., and Shimizu, K. (2010). The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-642-15031-9_25"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Ghiaasi, G., Koushanfar, F., and Nassif, S.R. (2011, January 15\u201318). Ultra-Low Power Current-Based PUF. Proceedings of the 2011 IEEE International Symposium on Circuits and Systems (ISCAS), Rio de Janeiro Brazil.","DOI":"10.1109\/ISCAS.2011.5938005"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Chen, Q., Csaba, G., Lugli, P., Schlichtmann, U., and R\u00fchrmair, U. (2011, January 5\u20136). The Bistable Ring Puf: A New Architecture for Strong Physical Unclonable Functions. Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), San Diego, CA, USA.","DOI":"10.1109\/HST.2011.5955011"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Simons, P., van der Sluis, E., and van der Leest, V. (2012, January 3\u20134). Buskeeper PUFs, a Promising Alternative to D Flip-Flop PUFs. Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), San Francisco, CA, USA.","DOI":"10.1109\/HST.2012.6224311"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Holcomb, D.E., and Fu, K. (2014). Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. International Workshop on Cryptographic Hardware and Embedded Systems, Springer.","DOI":"10.1007\/978-3-662-44709-3_28"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TETC.2013.2287182","article-title":"A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon","volume":"2","author":"Bossuet","year":"2014","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Willers, O., Huth, C., Guajardo, J., and Seidel, H. (2016, January 24\u201328). MEMS Gyroscopes as Physical Unclonable Functions. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978295"},{"key":"ref_50","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., and Heckert, A. (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Chan, J.J.M., Sharma, B., Lv, J., Thomas, G., Thulasiram, R., and Thulasiraman, P. (2011, January 2\u20134). True Random Number Generator Using GPUs and Histogram Equalization Techniques. Proceedings of the 13th IEEE International Conference on High Performance Computing and Communications (HPCC 2011), Banff, AB, Canada.","DOI":"10.1109\/HPCC.2011.30"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J.A. (2017, January 7\u201311). A Study of Power Supply Variation as a Source of Random Noise. Proceedings of the 30th International Conference on VLSI Design and 16th International Conference on Embedded Systems (VLSID 2017), Hyderabad, India.","DOI":"10.1109\/VLSID.2017.24"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Tehranipoor, F., Wortman, P., Karimian, N., Yan, W., and Chandy, J. (2018). DVFT: A Lightweight Solution for Power Supply Noise Based TRNG Using a Dynamic Voltage Feedback Tuning System. IEEE Trans. Very Large Scale Integr. Syst.","DOI":"10.1109\/TVLSI.2018.2804258"},{"key":"ref_54","unstructured":"Tehranipoor, F. (2017). Design and Architecture of Hardware-Based Random Function Security Primitives. [Ph.D. Thesis, University of Connecticut (UConn)]."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Eckert, C., Tehranipoor, F., and Chandy, J.A. (2017, January 6\u20139). DRNG: DRAM-Based Random Number Generation Using its Startup Value Behavior. Proceedings of the 60th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Boston, MA, USA.","DOI":"10.1109\/MWSCAS.2017.8053159"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1933","DOI":"10.1109\/COMST.2014.2320093","article-title":"Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures","volume":"16","author":"Komninos","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Mahmud, R., Vallakati, R., Mukherjee, A., Ranganathan, P., and Nejadpak, A. (2015, January 21\u201323). A Survey on Smart Grid Metering Infrastructures: Threats and Solutions. Proceedings of the 2015 IEEE International Conference on Electro\/Information Technology (EIT), Dekalb, IL, USA.","DOI":"10.1109\/EIT.2015.7293374"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Karygiannis, A., Phillips, T., and Tsibertzopoulos, A. (2006, January 25\u201327). RFID Security: A Taxonomy of Risk. Proceedings of the First International Conference on Communications and Networking in China (ChinaCom 2006), Beijing, China.","DOI":"10.1109\/CHINACOM.2006.344722"},{"key":"ref_59","unstructured":"Mitrokotsa, A., Rieback, M., and Tanenbaum, A. (, January June). Classification of RFID Attacks. Proceedings of the 2nd International Workshop on RFID Technology \u2013 Concepts Concepts, Applications, Challenges (IWRT 2008), Barcelona, Spain."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A Survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in Industries: A Survey","volume":"10","author":"He","year":"2014","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","article-title":"Context Aware Computing for the Internet of Things: A Survey","volume":"16","author":"Perera","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCAS.2017.2713305","article-title":"A Retrospective and a Look Forward: Fifteen Years of Physical Unclonable Function Advancement","volume":"17","author":"Chang","year":"2017","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Maes, R. (2013). Physically Unclonable Functions: Constructions, Properties and Applications, Springer. [1st ed.].","DOI":"10.1007\/978-3-642-41395-7"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Maes, R., and Verbauwhede, I. (2010). Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. Towards Hardware-Intrinsic Security, Springer.","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Rostami, M., Wendt, J.B., Potkonjak, M., and Koushanfar, F. (2014, January 24\u201328). Quo Vadis, PUF?: Trends and Challenges of Emerging Physical-Disorder Based Security. Proceedings of the Conference on Design, Automation & Test in Europe, Dresden, Germany.","DOI":"10.7873\/DATE.2014.365"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., and Holcomb, D.E. (2014, January 24\u201328). PUFs at a Glance. Proceedings of the Conference on Design, Automation & Test in Europe, Dresden, Germany.","DOI":"10.7873\/DATE.2014.360"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"B\u00f6hm, C., and Hofer, M. (2012). Physical Unclonable Functions in Theory and Practice, Springer Science & Business Media.","DOI":"10.1007\/978-1-4614-5040-5"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Busch, H., Sot\u00e1kov\u00e1, M., Katzenbeisser, S., and Sion, R. (2010). The PUF Promise. International Conference on Trust and Trustworthy Computing, Springer.","DOI":"10.1007\/978-3-642-13869-0_21"},{"key":"ref_71","unstructured":"Eiroa, S., Baturone, I., Acosta, A.J., and D\u00e1vila, J. (2010, January 12\u201314). Using Physical Unclonable Functions for Hardware Authentication: A Survey. Proceedings of the XXV Conference on Design of Circuits and Integrated Systems (DCIS), Lanzarote, Las Palmas, Canary Islands, Spain."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MDT.2010.7","article-title":"A Survey of Hardware Trojan Taxonomy and Detection","volume":"27","author":"Tehranipoor","year":"2010","journal-title":"IEEE Des. Test Comput."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Karri, R., Rajendran, J., and Rosenfeld, K. (2012). Trojan Taxonomy. Introduction to Hardware Security and Trust, Springer.","DOI":"10.1007\/978-1-4419-8080-9_14"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/MC.2010.299","article-title":"Trustworthy Hardware: Identifying and Classifying Hardware Trojans","volume":"43","author":"Karri","year":"2010","journal-title":"Computer"},{"key":"ref_75","unstructured":"Schaller, A. (2017). Lightweight Protocols and Applications for Memory-Based Intrinsic Physically Unclonable Functions Found on Commercial Off-The-Shelf Devices. [Ph.D. Thesis, Technische Universit\u00e4t Darmstadt]."},{"key":"ref_76","unstructured":"Ravishankar, Y. (2017). PUFs \u2013 An Extensive Survey. [Ph.D. Thesis, George Mason University]."},{"key":"ref_77","unstructured":"Sahoo, D.P. (2017). Design and Analysis of Secure Physically Unclonable Function Compositions. [Ph.D. Thesis, Indian Institute of Technology Kharagpur (IIT KGP)]."},{"key":"ref_78","first-page":"26","article-title":"\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 DRAM-PUF \u0434\u043b\u044f \u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u041c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0423\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043f\u043e\u0434 \u0423\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u041e\u0421 Android (in Russian)","volume":"1","year":"2016","journal-title":"\u0410\u043f\u0440\u043e\u0431\u0430\u0446\u0438\u044f"},{"key":"ref_79","unstructured":"\u041f\u0443\u0447\u043a\u043e\u0432, A.B., and \u0418\u0432\u0430\u043d\u044e\u043a\u0410, A.A. (2016, January 26). \u041f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0417\u0430\u043f\u043e\u043c\u0438\u043d\u0430\u044e\u0449\u0438\u0445 \u0423\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u041a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u041f\u0440\u0438\u043c\u0438\u0442\u0438\u0432\u043e\u0432 \u0434\u043b\u044f \u0418\u043d\u0442\u0435\u0433\u0440\u0430\u043b\u044c\u043d\u044b\u0445 \u0421\u0445\u0435\u043c \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u041b\u043e\u0433\u0438\u043a\u0438 (in Russian). Proceeding of the 2016 International Conference on Information Technologies and Systems (ITS 2016) \u2013 \u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b 2016 (\u0418\u0422\u0421 2016), Minsk, Belarus."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"940","DOI":"10.1109\/JSSC.2013.2239134","article-title":"Field Tolerant Dynamic Intrinsic Chip ID Using 32 nm High-K\/Metal Gate SOI Embedded DRAM","volume":"48","author":"Rosenblatt","year":"2013","journal-title":"IEEE J. Solid-State Circuits"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"2934","DOI":"10.1109\/JSSC.2013.2282114","article-title":"A Self-Authenticating Chip Architecture Using an Intrinsic Fingerprint of Embedded DRAM","volume":"48","author":"Rosenblatt","year":"2013","journal-title":"IEEE J. Solid-State Circuits"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"11542","DOI":"10.3390\/s140711542","article-title":"A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks","volume":"14","author":"Liu","year":"2014","journal-title":"Sensors"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Liu, W., Zhang, Z., Li, M., and Liu, Z. (2014, January 10\u201312). A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks. Proceedings of the 2014 International Symposium on Computer, Consumer and Control (IS3C), Taichung, Taiwan.","DOI":"10.1109\/IS3C.2014.188"},{"key":"ref_84","unstructured":"Zhang, Z. (2015). Design and Implementation of DRAM PUF (in Chinese). [Master\u2019s Thesis, Huazhong University of Science and Technology]."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Rahmati, A., Hicks, M., Holcomb, D.E., and Fu, K. (2015, January 13\u201317). Probable Cause: The Deanonymizing Effects of Approximate DRAM. Proceedings of the 2015 ACM\/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA), Portland, Oregon.","DOI":"10.1145\/2749469.2750419"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Sutar, S., Raha, A., and Raghunathan, V. (2016, January 2\u20137). D-PUF: An Intrinsically Reconfigurable DRAM PUF for Device Authentication in Embedded Systems. Proceedings of the 2016 International Conference on Compilers, Architectures, and Sythesis of Embedded Systems (CASES), Pittsburgh, PA, USA.","DOI":"10.1145\/2968455.2968519"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Sutar, S., Raha, A., and Raghunathan, V. (arXiv, 2017). Memory-Based Combination PUFs for Device Authentication in Embedded Systems, arXiv.","DOI":"10.1109\/TMSCS.2018.2885758"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J.A. (2017, January 28\u201331). Investigation of DRAM PUFs Reliability Under Device Accelerated Aging Effects. Proceedings of the 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA.","DOI":"10.1109\/ISCAS.2017.8050629"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Sheikh, F., Sousa, L., and Iniewski, K. (2017). Physically Unclonable Functions: A Window into CMOS Process Variations. Circuits and Systems for Security and Privacy, CRC Press.","DOI":"10.1201\/b19499-13"},{"key":"ref_90","unstructured":"Wojcicki, T., and Iniewski, K. (2017). Dynamic Intrinsic Chip ID for Hardware Security. VLSI: Circuits for Emerging Applications, CRC Press."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Raha, A., Jayakumar, H., Sutar, S., and Raghunathan, V. (2015, January 4\u20139). Quality-Aware Data Allocation in Approximate DRAM. Proceedings of the 2015 International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Amsterdam, The Netherlands.","DOI":"10.1109\/CASES.2015.7324549"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1109\/TC.2016.2640296","article-title":"Quality Configurable Approximate DRAM","volume":"66","author":"Raha","year":"2017","journal-title":"IEEE Trans. Comput."},{"key":"ref_93","unstructured":"Anagnostopoulos, N.A., Schaller, A., Fan, Y., Xiong, W., Tehranipoor, F., Arul, T., Gabmeyer, S., Szefer, J., Chandy, J.A., and Katzenbeisser, S. (2017, January 1\u20132). Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-The-Shelf Devices for Security Applications. Proceedings of the 26th Crypto-Day, Nuremberg, Germany."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1109\/TCAD.2016.2638445","article-title":"PUF-Based Fuzzy Authentication Without Error Correcting Codes","volume":"36","author":"Yan","year":"2017","journal-title":"IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. (CAD)"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Yan, W., Tehranipoor, F., and Chandy, J.A. (2015, January 2\u20136). A Novel Way to Authenticate Untrusted Integrated Circuits. Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD 2015), Austin, TX, USA.","DOI":"10.1109\/ICCAD.2015.7372560"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., and Verbauwhede, I. (July, January 28). A Soft Decision Helper Data Algorithm for SRAM PUFs. Proceedings of the 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, South Korea.","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"ref_97","unstructured":"Anagnostopoulos, N.A. (2014). Optical Fault Injection Attacks in Smart Card Chips and an Evaluation of Countermeasures Against Them. [Master\u2019s Thesis, University of Twente]."},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Karimian, N., Wortman, P.A., and Tehranipoor, F. (2016, January 2\u20137). Evolving Authentication Design Considerations for the Internet of Biometric Things (IoBT). Proceedings of the 2016 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ISSS 2016), Pittsburgh, PA, USA.","DOI":"10.1145\/2968456.2973748"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/2\/7\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:58:51Z","timestamp":1760194731000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/2\/7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,28]]},"references-count":98,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,6]]}},"alternative-id":["cryptography2020007"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2020007","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2018,3,28]]}}}