A Machine-Learning-Resistant 3D PUF with 8-layer Stacking Vertical RRAM and 0.014% Bit Error Rate Using In-Cell Stabilization Scheme for IoT Security Applications


Abstract: "In this work, we propose and demonstrate a multi-layer 3-dimensional (3D) vertical RRAM (VRRAM) PUF with in-cell stabilization scheme to improve both cost efficiency and reliability. An 8-layer VRRAM array was manufactured with excellent uniformity and good endurance of >10 7 . Apart from the variation in RRAM resistance, enhanced randomness is obtained thanks to the parasitic IR... » read more

IoT Cybersecurity Improvement Act of 2020


The "IoT Cybersecurity Improvement Act of 2020" became a U.S. law on 12/4/2020.   The legislation was passed by unanimous consent by the Senate and the House of Representatives. Congress.Gov states: "This bill requires the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (OMB) to take specified steps to increase cybersecurity for Internet of ... » read more

The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes


Abstract: "Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from IP piracy by untrusted entities in the design and fabrication process. In this case, the netlist is locked by adding extra key-gates, and will be unlocked only if a correct key is applied to the key-gates. The key is assumed to be written into a non-volatile memory after the fabricati... » read more

U.S. Senate Report On The Equifax Breach


Source: U.S. Senate, Permanent Subcommittee On Investigations Committee on Homeland Security and Governmental Affairs Here's the link to the U.S. Senate report on the Equifax breach » read more

MRAM: from STT to SOT, for security and memory


Abstract: "Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) is one of the leading candidates for embedded memory convergence in advanced technology nodes. It is particularly adapted to low-power applications, requiring a decent level of performance. However, it also have interests for secured applications. The PRESENT cipher is a lightweight cryptographic algorithm targeting ultra... » read more

FDA: Postmarket Management of Cybersecurity in Medical Devices


Source: U.S. Food & Drug Administration, Center for Devices & Radiological Health dated 12/28/16 "The Food and Drug Administration (FDA) is issuing this guidance to inform industry and FDA staff of the Agency’s recommendations for managing postmarket cybersecurity vulnerabilities for marketed and distributed medical devices. In addition to the specific recommendations contained in this gui... » read more

Strategic Principles For Securing The Internet Of Things (IoT)


Source: U.S. Department Of Homeland Security. Version 1.0 Dated: 11/15/16 "The growth of network-connected devices, systems, and services comprising the Internet of Things (IoT) creates immense opportunities and benefits for our society. IoT security, however, has not kept up with the rapid pace of innovation and deployment, creating substantial safety and economic risks. This document expla... » read more

Newer posts →