Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

2011

Cryptography

Articles 1 - 1 of 1

Full-Text Articles in Electrical and Computer Engineering

Exploitation Of Unintentional Information Leakage From Integrated Circuits, William E. Cobb Dec 2011

Exploitation Of Unintentional Information Leakage From Integrated Circuits, William E. Cobb

Theses and Dissertations

Unintentional electromagnetic emissions are used to recognize or verify the identity of a unique integrated circuit (IC) based on fabrication process-induced variations in a manner analogous to biometric human identification. The effectiveness of the technique is demonstrated through an extensive empirical study, with results presented indicating correct device identification success rates of greater than 99:5%, and average verification equal error rates (EERs) of less than 0:05% for 40 near-identical devices. The proposed approach is suitable for security applications involving commodity commercial ICs, with substantial cost and scalability advantages over existing approaches. A systematic leakage mapping methodology is also proposed to …