... based on XOR operations. Opt. Eng. 38(1), 47–54 (1999) 110. A. Peleg, U. Weiser, MMX technology extension to the ... commodity dram technology, in 2017 50th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) (2017) ...
... DRAM cell decay was not considered in this paper, as commodity devices usually give no control over DRAM voltages. However, voltage dependency could be another viable characteristic used for the run-time accessible DRAM PUFs, if future ...
... PUF based on non - linear current mirrors . In : HOST , pp . 38–43 . IEEE Computer Society ( 2014 ) 19. Laor , T. , et al .: DrawnApart : a device identification technique based on remote GPU fingerprinting . In : NDSS ( 2022 ) 20 ...
... DRAM-based intrinsic physically unclonable functions for system-level security and authentication. IEEE Trans. Very Large Scale Integr. Syst. 25(3), 1085–1097 (2017) Schaller, A., et al.: Decay-based DRAM PUFs in commodity devices. IEEE ...
... DRAM. In Annual International Symposium on Computer Architecture (ISCA). 49. Richter, A., Herber, C., Wild, T., & Herkersdorf, A. (2015). Denial-of-service attacks on PCI passthrough devices ... PUFs: Leveraging the Rowhammer effect for ...
... PUFs of making retention failures more timely . Hashemian et al . [ 46 ] propose extracting a PUF signature from the pattern of ... Memory - Based Security Primitives As memory technologies change , and new memory architectures are.