Access the full text.
Sign up today, get DeepDyve free for 14 days.
References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.
Spintronic PUFs for Security, Trust, and Authentication ANIRUDH IYENGAR, SWAROOP GHOSH, KENNETH RAMCLAM, JAE-WON JANG, and CHENG-WEI LIN, University of South Florida We propose spintronic physically unclonable functions (PUFs) to exploit security-specific properties of domain wall memory (DWM) for security, trust, and authentication. We note that the nonlinear dynamics of domain walls (DWs) in the physical magnetic system is an untapped source of entropy that can be leveraged for hardware security. The spatial and temporal randomness in the physical system is employed in conjunction with microscopic and macroscopic properties such as stochastic DW motion, stochastic pinning/depinning, and serial access to realize novel relay-PUF and memory-PUF designs. The proposed PUFs show promising results (50% interdie Hamming distance (HD) and 10% to 20% intradie HD) in terms of randomness, stability, and resistance to attacks. We have investigated noninvasive attacks, such as machine learning and magnetic field attack, and have assessed the PUFs resilience. CCS Concepts: Security and privacy Hardware-based security protocols; Spintronics and magnetic technologies r r Hardware Additional Key Words and Phrases: Domain wall memory, nanowire, hardware security, physically unclonable function, chip authentication, threat models, magnetic attack ACM Reference Format: Anirudh Iyengar, Swaroop Ghosh, Kenneth Ramclam, Jae-Won Jang, and
ACM Journal on Emerging Technologies in Computing Systems (JETC) – Association for Computing Machinery
Published: Apr 25, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.