Comparative Analysis of SRAM PUF Temperature Susceptibility on Embedded Systems

Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

3 Citations (Scopus)

Abstract

An SRAM Physical Unclonable Function (PUF) can distinguish SRAM modules by analyzing the inherent randomness of their start-up behavior. However, the effectiveness of this technique varies depending on the design and fabrication of the SRAM module. This study compares two similar microcontrollers, both equipped with on-chip SRAM, to determine which device produces a better SRAM PUF. Both microcontrollers are programmed with an identical SRAM PUF authentication routine and tested under varying ambient temperatures (ranging from 10 °C to 50 °C) to evaluate the impact of temperature on SRAM PUF performance. One embedded SRAM works significantly better than the other, even though the two models are closely related. The presented results can be used early in the design process to compare arbitrary on-chip SRAM models and see which is best suited for implementing an SRAM PUF.

Original languageEnglish
Title of host publicationInternational Conference on Electrical, Computer and Energy Technologies, ICECET 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350327816
DOIs
Publication statusPublished - 2023
Event2023 IEEE International Conference on Electrical, Computer and Energy Technologies, ICECET 2023 - Cape Town, South Africa
Duration: 16 Nov 202317 Nov 2023

Publication series

NameInternational Conference on Electrical, Computer and Energy Technologies, ICECET 2023

Conference

Conference2023 IEEE International Conference on Electrical, Computer and Energy Technologies, ICECET 2023
Country/TerritorySouth Africa
CityCape Town
Period16.11.202317.11.2023

Keywords

  • chip biometrics
  • embedded systems
  • fuzzy extractor
  • hardware authentication
  • SRAM PUF
  • temperature

Fingerprint

Dive into the research topics of 'Comparative Analysis of SRAM PUF Temperature Susceptibility on Embedded Systems'. Together they form a unique fingerprint.

Cite this