Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

FIU Electronic Theses and Dissertations

2021

Counterfeit Memory

Articles 1 - 1 of 1

Full-Text Articles in Engineering

Non-Invasive Techniques Towards Recovering Highly Secure Unclonable Cryptographic Keys And Detecting Counterfeit Memory Chips, Bashir Mohammad Sabquat Bahar Talukder Nov 2021

Non-Invasive Techniques Towards Recovering Highly Secure Unclonable Cryptographic Keys And Detecting Counterfeit Memory Chips, Bashir Mohammad Sabquat Bahar Talukder

FIU Electronic Theses and Dissertations

Due to the ubiquitous presence of memory components in all electronic computing systems, memory-based signatures are considered low-cost alternatives to generate unique device identifiers (IDs) and cryptographic keys. On the one hand, this unique device ID can potentially be used to identify major types of device counterfeitings such as remarked, overproduced, and cloned. On the other hand, memory-based cryptographic keys are commercially used in many cryptographic applications such as securing software IP, encrypting key vault, anchoring device root of trust, and device authentication for could services. As memory components generate this signature in runtime rather than storing them in memory, …