Asset1 Shutterstock 1916603153 1 1540 800 614245ca4432c

A Reverse-Engineering Assessment of a Secure Authenticator with PUF Technology

Sept. 15, 2021
From fault injection to side-channel analysis cybercriminal attacks grow more sophisticated. But you can’t steal what isn’t there. Enter the physically unclonable function (PUF) and a third-party security lab’s study on ChipDNA™ PUF technology.
From fault injection to side-channel analysis and invasive techniques, cybercriminals continue to become more sophisticated in their attack methods that are applied to security ICs. With pervasive connectivity and the resulting exposure, hardware-based security provides the most effective solution for protecting the assets of embedded systems. The newest embedded security ICs feature the most advanced level of protection against invasive attacks currently available: the physically unclonable function (PUF). This paper provides the findings of a reverse-engineering study conducted by a third-party security lab to evaluate the security robustness of Maxim’s secure authenticator with ChipDNA™ PUF technology. 

Sponsored

Application Note: Motor Control Solutions for your Electric Toothbrush

The global population increasingly prioritizes oral health and hygiene, driving the utilization of toothbrushes across the world. The most popular and effective type of electric...

Power Topologies Handbook

Buy ICs, tools & software directly from TI. Request samples, enjoy faster checkout, manage orders online and more with your myTI account.

Next Generation RADAR

Aerospace and Defense applications conform to the tightest standards. ADI provides you with the confidence and support to ensure your design is a success.

A Long-Range Solution for Triggering Analyzers with Arduino Microcontrollers

Remote measurements using VNAs are becoming an increasingly popular method due to the increased portability of USB vector network analyzers. For applications such as far-field...