Asset1 Shutterstock 1916603153 1 1540 800 614245ca4432c

A Reverse-Engineering Assessment of a Secure Authenticator with PUF Technology

Sept. 15, 2021
From fault injection to side-channel analysis cybercriminal attacks grow more sophisticated. But you can’t steal what isn’t there. Enter the physically unclonable function (PUF) and a third-party security lab’s study on ChipDNA™ PUF technology.
From fault injection to side-channel analysis and invasive techniques, cybercriminals continue to become more sophisticated in their attack methods that are applied to security ICs. With pervasive connectivity and the resulting exposure, hardware-based security provides the most effective solution for protecting the assets of embedded systems. The newest embedded security ICs feature the most advanced level of protection against invasive attacks currently available: the physically unclonable function (PUF). This paper provides the findings of a reverse-engineering study conducted by a third-party security lab to evaluate the security robustness of Maxim’s secure authenticator with ChipDNA™ PUF technology. 

Sponsored

Episode 1: Meet the Contestants & Judges - Circuit Showdown | Mouser Electronics

Welcome to the first episode of Circuit Showdown! In this exciting new competition, three university engineering students—Charles from Texas State University...

RECOM’s RMOD600-EW series high power density module for E-mobility and industry vehicles

RECOM's RMOD families are extremely robust plug-and-play modules used to generate the low voltage network from a vehicle’s traction battery.

Temperature Sensors: The Basics

Get the basics on temperature sensors including thermocouples, thermistors, resistance temperature detectors (RTDs) and infrared sensors.

RPL-3.0 Thermally-Enhanced Buck Converter

RECOM's RPL-3.0 series is a DC/DC converter in a compact 3mm x 3mm x 1.45mm ten-pad LGA package. It has an input range of 3VDC to 18VDC and the output voltage can be set with ...