Riskanalysis of Physically Unclonable Functions

Andrea Kolberger, Ingrid Schaumüller-Bichl, Martin Deutschmann

Research output: Chapter in Book/Report/Conference proceedingsConference contribution


Physically unclonable functions (PUFs) are an emerging technology that have been proposed as central building blocks in a variety of cryptographic application areas. Keys are not stored permanently anymore, but generated as needed using unique "fingerprints" that are inherent in each device. Since PUFs are "noisy" functions responses generated by a certain PUF instantiation are error-prone and therefore highly sophisticated error correction is required to reliably reconstruct the respective PUF response. To be aware of potential threats and vulnerabilities concerning PUF-based security schemes a risk analysis on different use cases was performed in order to gain requirements for the development and implementation of effective error correction methods as well as requirements regarding the whole operational life cycle of such tokens.
Original languageEnglish
Title of host publicationCommunications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Proceedings
Number of pages4
ISBN (Print)978-3-662-44884-7
Publication statusPublished - 2014
Event15th IFIP TC6/TC11 International Conference on Communications and Multimedia Security - CMS 2014 - Aveiro, Portugal
Duration: 25 Sept 201426 Sept 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8735 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference15th IFIP TC6/TC11 International Conference on Communications and Multimedia Security - CMS 2014
Internet address


  • Physically Unclonable Functions
  • Riskanalysis
  • Fuzzy Extractor
  • Authentication
  • Risk Analysis
  • Error Correction
  • Physically Unclonable Function (PUF)
  • Key Generation
  • HW/SW Binding
  • Cryptographic Applications
  • Vulnerabilities and Threats


Dive into the research topics of 'Riskanalysis of Physically Unclonable Functions'. Together they form a unique fingerprint.

Cite this