Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Engineering
Non-Invasive Techniques Towards Recovering Highly Secure Unclonable Cryptographic Keys And Detecting Counterfeit Memory Chips, Bashir Mohammad Sabquat Bahar Talukder
Non-Invasive Techniques Towards Recovering Highly Secure Unclonable Cryptographic Keys And Detecting Counterfeit Memory Chips, Bashir Mohammad Sabquat Bahar Talukder
FIU Electronic Theses and Dissertations
Due to the ubiquitous presence of memory components in all electronic computing systems, memory-based signatures are considered low-cost alternatives to generate unique device identifiers (IDs) and cryptographic keys. On the one hand, this unique device ID can potentially be used to identify major types of device counterfeitings such as remarked, overproduced, and cloned. On the other hand, memory-based cryptographic keys are commercially used in many cryptographic applications such as securing software IP, encrypting key vault, anchoring device root of trust, and device authentication for could services. As memory components generate this signature in runtime rather than storing them in memory, …