References
- G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," In Proc. Annu. Design Autom. Conf., June 2007, pp. 9-14.
- 강유성 외 3인, 물리적 복제 방지 기능(PUF) 보안 요구사항 및 시험방법 국제표준화 동향," 정보보호학회지, 제28권 제4호, 2018. 8.
- D. Lim et al., "Extracting secret keys from integrated circuits," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 10, 2005, pp. 1200-1205. https://doi.org/10.1109/TVLSI.2005.859470
- A Maiti et al., "A large scale characterization of RO-PUF," In Proc. IEEE Int. Symp. Hardware-Oriented Security Trust, June 2010, pp. 94-99, June 2010.
- Z. Cherif et al., "An Easy-to-Design PUF based on a single oscillator: the Loop PUF," In Proc. Euromicro Conf. Digital Syst. Design, Sept. 2012.
-
T. W. Kim, B. D. Choi, and D. K. Kim, "Zero bit error rate ID generation circuit using via formation probability in
$0.18{\mu}m$ CMOS process," Electron. Lett., vol. 50, no. 12, 2014, pp. 876-877. https://doi.org/10.1049/el.2013.3474 - D. Holcomb, W. Burleson, and K. Fu, "Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers," IEEE Trans. Comput., vol. 58, no. 9, Sept. 2009, pp. 1198-1210. https://doi.org/10.1109/TC.2008.212
- W. Xiong et al., "Run-time Accessible DRAM PUFs in Commodity Devices," In Proc. Conf. Cryptographic Hardw. Embedded Syst., Santa Barbara, USA, Aug. 2016, pp. 432-453.
- A. Das, N. Boriso, and E. Chou, "Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures," Privacy Enhancing Technol. Symp., vol. 2018, no. 1, 2018, pp. 88-108.
- I. Amerini et al., "Smartphone Fingerprinting Combining Features of On-Board Sensors," IEEE Trnas. Inf. Forensics Security, vol. 12, no. 10, Oct. 2017.
- O. Willers et al., "MEMS-based Gyroscopes as Physical Unclonable Functions," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Vienna, Austria, Oct. 2016, pp. 591-602.
- R. Jin et al., "MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers," IEEE Trnas. Inf. Forensics Security, vol. 11, no. 6, June 2016.
- J. Lukas and J. Fridrich, "Digital Camera Identification From Sensor Pattern Noise," IEEE Trnas. Inf. Forensics Security, vol. 1, no. 2, June 2006.
- A. Lawgaly and F. Khelifi, "Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification," IEEE Trnas. Inf. Forensics Security, vol. 12, no. 2, Feb. 2017.
- Y. Tomioka, Y. Ito, and H. Kitazawa, "Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise," IEEE Trnas. Inf. Forensics Security, vol. 8, no. 12, Dec. 2013.
- 오태우 외, "센서 패턴 잡음을 이용한 디지털 상 획득 장치 판별," 정보처리학회논문지/소프트웨어 데이터 공학, 제4권 제12호, 2015. 12.
- 이상형 외, "모폴로지필터링기반 센서 패턴 노이즈를 이용한 디지털 동상 획득 장치 별 기술," 정보처리학회논문지/소프트웨어 데이터 공학, 제6권 제1호, 2017. 1.
- A. Lawgaly, "Digital camera identification using sensor pattern noise for forensics applications," [online] available at: http://nrl.northumbria.ac.uk/32314/
- L. J. G.Villalba et al., "A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques," Future Generation Comput. Syst., vol. 76, 2017, pp. 418-427. https://doi.org/10.1016/j.future.2016.11.007
- Netherlands Forensic Institute. PRNU Decompare. 2013. [online source] available at: https://sourceforge.net/p/prnudecompare/wiki/Home/
- S. A. Anand et al., "Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers-How using the smartphone in speakerphone mode erodes your privacy," IEEE Trnas. Inf. Forensics Security, vol. 12, no. 2, Feb. 2017.
- A. Das, N. Borisov, and M. Caesar, "Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting", ArXiv 2015.