The Groundbreaking Hardware Security Book Series
PUFsecurity
We focus on developing effective and economical PUF-based security IPs based on NeoPUF and NeoFuse OTP in this AIoT era.
How This Book Series Came to Be
Since the establishment of PUFsecurity, we have been encouraged to enlighten the broader semiconductor community on the risk of unsecured chips. This journey of continuous education and promotion of Quantum Tunneling PUF ultimately led to the publication of the book series.
This book series aims to introduce the fundamentals of PUF-based Hardware Security. It delves into a wide range of topics, including Quantum Tunneling PUF, an overview of PUF-based solutions, tamperproof design, random number generation, and the importance of cryptography to Hardware Security. Applications like AI, IoT and an overview of the latest security standards and regulations are also discussed. We want to present the collective understanding of Hardware Security through this book series and make an impact on the future of computing.
“I was seldom able to see an opportunity until it had ceased to be one.”
For many years, this quote from Mark Twain has been imprinted in my mind, reminding me that good ideas, whenever they arrive, must be seized to become genuine opportunities. So, when I met Tang Ma in 2015, shortly after his retirement from Maxim, his explanation of the possibilities of PUF (Physically Unclonable Function) for semiconductors and the critical role it could play in security felt like an opportunity worth pursuing.
I knew this technology would be foundational for securing the future of interconnected computing. Since then, these two critical findings have established the silicon fingerprint, NeoPUF, which led to the founding of our company, PUFsecurity, and the development of our integrated suite of security subsystems that play a vital role in the Hardware Security ecosystem.
-- Dr. Charles Hsu, Founder of eMemory and PUFsecurity
Begin Your Adventure in Hardware Security Here
Book 1: Quantum-Tunneling PUF
The first book of this series - Quantum Tunneling PUF, covers all the basics of hardware security and PUF, including essential PUF properties, popular PUF implementations, and common challenges when designing PUFs. In this book, readers will learn the importance of PUF in hardware security and, more specifically, why seeking even better PUF solutions is necessary, followed by the more advanced topics about designing highly robust PUFs, especially in the quantum tunneling PUF technology. We hope that readers can gain some insight into how to design or choose the right PUF solution for security systems or applications.
Download>>Book 1: Quantum-tunneling PUF
Book 2: PUF-based Solutions and Applications
A portion of this book is based on the customer document package included in every set of deliverables from PUFsecurity. To make this book more accessible, all technical concepts and terms were examined to determine if they could be further expanded. The goal is to create an easy-to-follow guide for readers to understand the benefits of PUFs and how PUF-based solutions operate in a secure system.
After this important background information was established, the dual solutions of PUFrt and PUFcc from PUFsecurity were introduced before selected applications pulled from the growing fields of AI and IoT were described in detail to give readers practical examples of what PUF-based solutions can do in real-life scenarios. Originally created as part of a separate book on AI and IoT, the chapters related to applications were later incorporated into this book.
Book 3: Anti-Tampering Designs in Hardware Security
In this book, we will take PUFsecurity’s product PUFrt as an example, which features one-time programmable (OTP), static entropy NeoPUF, and dynamic random number (TRNG). Starting with introducing the system architecture of memory, the book will state various attack methods on chips and the threat models they generate. The countermeasures and protective technologies based on various threats will then be provided. We hope our readers gain a thorough knowledge of HRoT design and understand the design concepts of a secure system as well as what to be aware of.
For more information on our solutions or any questions regarding how we can meet your requirements, please don't hesitate to contact us. We are happy to provide the best possible solutions for your needs.
Learn more about our security solutions: https://www.pufsecurity.com/products/
Contact us: [email protected]
I am very proud of our team members to spend their precious time to write down what they did in PUF-based hardware security based on their true experiences to benefit the industry and academia society. We also offers two security courses at Department of EE of National Tsinghua University to help students to understand more on hardware security. We are also partnering with Taiwan Semiconductor Research Institute and Institute of Information Industry to offer security courses to under-/graduate students. In our website WWW. PUFACADEMY.COM, we offer 150hrs off/online courses on PUF-based hardware security. In the future, we will cowork with Arm Academy to distribute these courses worldwide to help whoever are interested to learn the importance of hardware security.