Cobb et al., 2010 - Google Patents
Physical layer identification of embedded devices using RF-DNA fingerprintingCobb et al., 2010
View PDF- Document ID
- 1062023716837938722
- Author
- Cobb W
- Garcia E
- Temple M
- Baldwin R
- Kim Y
- Publication year
- Publication venue
- 2010-Milcom 2010 Military Communications Conference
External Links
Snippet
RF distinct native attribute (RF-DNA) fingerprinting is introduced as a means to uniquely identify embedded processors and other integrated circuit devices by passively monitoring and exploiting unintentional RF emissions. Device discrimination is accomplished using RF …
- 229920003013 deoxyribonucleic acid 0 title description 22
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R1/00—Details of instruments or arrangements of the types included in groups G01R5/00 - G01R13/00 and G01R31/00
- G01R1/02—General constructional details
- G01R1/06—Measuring leads; Measuring probes
- G01R1/067—Measuring probes
- G01R1/073—Multiple probes
- G01R1/07307—Multiple probes with individual probe elements, e.g. needles, cantilever beams or bump contacts, fixed in relation to each other, e.g. bed of nails fixture or probe card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0013—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
- G06K7/0021—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers for reading/sensing record carriers having surface contacts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/08—Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes
- G06K7/082—Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors
- G06K7/083—Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors inductive
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/282—Testing of electronic circuits specially adapted for particular applications not provided for elsewhere
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/2832—Specific tests of electronic circuits not provided for elsewhere
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R33/00—Arrangements or instruments for measuring magnetic variables
- G01R33/20—Arrangements or instruments for measuring magnetic variables involving magnetic resonance
- G01R33/44—Arrangements or instruments for measuring magnetic variables involving magnetic resonance using nuclear magnetic resonance [NMR]
- G01R33/46—NMR spectroscopy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Cobb et al. | Physical layer identification of embedded devices using RF-DNA fingerprinting | |
| Cobb et al. | Intrinsic physical-layer authentication of integrated circuits | |
| US9036891B2 (en) | Intrinsic physical layer authentication of integrated circuits | |
| Danev et al. | Transient-based identification of wireless sensor nodes | |
| Tu et al. | Research on the Internet of Things device recognition based on RF-fingerprinting | |
| Standaert et al. | Using subspace-based template attacks to compare and combine power and electromagnetic information leakages | |
| Li et al. | Study on the BeiHang keystroke dynamics database | |
| Montminy et al. | Improving cross-device attacks using zero-mean unit-variance normalization | |
| Han et al. | Butterfly: Environment-independent physical-layer authentication for passive RFID | |
| Zhang et al. | From homogeneous to heterogeneous: Leveraging deep learning based power analysis across devices | |
| Ahmed et al. | Noisense print: detecting data integrity attacks on sensor measurements using hardware-based fingerprints | |
| Dubendorfer et al. | ZigBee device verification for securing industrial control and building automation systems | |
| Bassey et al. | Device authentication codes based on RF fingerprinting using deep learning | |
| Stone et al. | Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process | |
| Farheen et al. | Proof of reverse engineering barrier: sem image analysis on covert gates | |
| Yuan et al. | Specific emitter identification based on transient energy trajectory | |
| Zhang et al. | A hardware Trojan detection method based on the electromagnetic leakage | |
| Mariano et al. | Classification of electronic devices and software processes via unintentional electronic emissions with neural decoding algorithms | |
| Kitazawa et al. | Fundamental Study on Simple Power Analysis Using Backscattering from Switching Regulators | |
| Wu et al. | Specific Emitter Identification Based on Multi-Scale Attention Feature Fusion Network | |
| Saadat et al. | Physical layer biometrics using antennas for secure wearable wireless communication | |
| CN104463222A (en) | Polarimetric SAR image classification method based on feature vector distribution characteristic | |
| Cobb | Exploitation of unintentional information leakage from integrated circuits | |
| Na et al. | Environmental monitoring and evaluation system based on radio fingerprint recognition algorithm | |
| Jeon et al. | Filtering-based correlation power analysis (CPA) with signal envelopes against shuffling methods |