A DRAM based Physical Unclonable Function Capable of Generating >10 32 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication

Size: px
Start display at page:

Download "A DRAM based Physical Unclonable Function Capable of Generating >10 32 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication"

Transcription

1 A DRAM based Physical Unclonable Function Capable of Generating >10 32 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication Q. Tang, C. Zhou, *W. Choi, *G. Kang, *J. Park, K. K. Parhi, and C. H. Kim University of Minnesota, Minneapolis, USA *Korea University, Seoul, Korea

2 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 1

3 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 2

4 Physical Unclonable Function (PUF) Fingerprint of chip PUF Inputs Challenge #1 Challenge #2 Numerous input choices Outputs Response #1 Response #2 Challenge #n Response #n Unique and random: Based on inherent process variation Secure: Large # of challenge-response pairs (CRPs) Unique and random responses Challenges Chip #1 Chip #2 Responses #1 Responses #2 4 5

5 Weak PUF vs. Strong PUF Weak PUF: # of CRPs* proportional to # of unit cells Example: SRAM PUF Application: key generation BL WL WL BLB Strong PUF: # of CRPs exponential to # of unit stages (2 n ) Example: MUX arbiter PUF Application: system authentication #1 #n Response S Q SR Latch R Challenge *CRP: Challenge Response Pair 5

6 DRAM Retention Characteristics WL t refresh BL Leakage V storage Vstorage Time Vref Data retention time depends on the leakage current and capacitance of the storage node Refresh required before the cell data flips 3

7 DRAM based PUF Write All 1 s Retention Failure Map Wait > 40μs Data 1 Data 0 Failure locations unique to each chip Retention time adjusted by word line voltage Only weak PUF configuration implemented S. Rosenblatt, et al., JSSC, 2013 (IBM) 4

8 SRAM PUF vs. DRAM PUF SRAM PUF DRAM PUF Schematic WL WL WL Vstorage BL BLB BL Challenge Method Power up VDD Response value = 0 or 1 Vstorage Write '1' Vref Write '0' t wait Time Time Key Features Power off required Weak PUF configuration only Power is kept on Strong PUF configuration possible V, T variation can be compensated 6

9 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 7

10 Proposed 2T DRAM based PUF 2T DRAM WWL (VDD+0.4V) RBL (VDD) 1T1C DRAM WL WBL (GND) V storage V storage RWL (VDD) BL K. Chun, et al., ISSCC 2011, JSSC 2012 Logic compatible Retention time similar to 1T1C t wait = 10.5ms induces 10% 27ºC 8

11 DRAM based Strong PUF Array 2T gain cell RBL SA+Writeback WBL 01 9 IO_SEL RIO WIO Column Decoder (5 bits) WWL RWL Vref Row Decoder (5 bits) Chip IOs

12 Proposed Authentication Scheme Upper Array Input Pattern (128 bits) Unused cells Flipped cells Data 1 Data 0 Step 1: Write a 128 bit pattern to selected upper array Challenge: start location (=512) + input data ( 1 or 0 ) 13

13 Proposed Authentication Scheme Upper Array Input Pattern (128 bits) After 10.5ms Hidden Pattern Unused cells Flipped cells Data 1 Data 0 Step 2: Wait for 10.5ms to induce 10% cell failures Internally generated pattern is hidden to outside world 13

14 Proposed Authentication Scheme Upper Array Input Pattern (128 bits) After 10.5ms Hidden Pattern Unused cells Flipped cells Data 1 Data to 512 Random Mapping Lower Array Step 3: Write hidden pattern to lower array Challenge: mapping information (=Permutation(512, 128)) 13

15 Proposed Authentication Scheme Upper Array Input Pattern (128 bits) After 10.5ms Hidden Pattern Unused cells Flipped cells Data 1 Data to 512 Random Mapping Lower Array After 10.5ms Final Response (128 bits) Step 4: Collect responses from lower array after 10.5ms # of Challenges = Permutation(512, 128) 13

16 Enrollment and Authentication Flow Enrollment Write 1 or 0 DRAM Array No Mask Cell stable? W 1 R? W 0 R? Yes Server 14

17 Enrollment and Authentication Flow Enrollment Write 1 or 0 Authentication Calibration DRAM Array No Mask Cell stable? W 1 R? W 0 R? Yes Server 15

18 Enrollment and Authentication Flow Enrollment Write 1 or 0 Authentication Calibration No Mask DRAM Array Cell stable? W 1 R? W 0 R? Yes Start cell address Input Pattern Write Upper Array Repetitive Read Write-backs Hidden Pattern Challenge Server 16

19 Enrollment and Authentication Flow Enrollment Write 1 or 0 Authentication Calibration No Mask DRAM Array Cell stable? W 1 R? W 0 R? Yes Challenge Start cell address Random Mapping Input Pattern Write Upper Array Repetitive Read Write-backs Hidden Pattern Write Lower Array Repetitive Read Write-backs Response Server 17

20 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 18

21 DRAM PUF Response Distribution Probability (%) Write 1 6.5% 65nm, 1.2V, 27ºC 1K memory cells, 500 trials 84.7% Average Response Stable cells (84.7%) Flipped cells (6.5%) Unstable cells (8.8%) Average response over 500 trials More flip cells (red color bar) desired Few unstable cells (gray color bar) desired 1 After 10.5 ms After 10.5 ms After 10.5 ms

22 Repetitive Write-back Scheme Stable cells Flipped cells One-time read-out Repetitive write-back The flip can happen at any time Unstable cells Weak 1 cell tends to be a strong 0 cell, and vice versa Repetitive write-back = detect flip in repeated test % of stable cells, % of flip cells, % of unstable cells 20

23 Repetitive Write-back Scheme W 1 W 0 Always % 6.5% Always 0 Unstable No write-backs 6.5% 8.8% 7.2% 10 write-backs W 1 W % 11.6% 86.3% 12.7% 83.2% 6.0% 5.2% Unstable Cells (%) nm, 1.2V, 27ºC Write # of write-backs # of flipped cells increases: better uniqueness # of unstable cells decreases: better stability 21

24 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 22

25 Intra- and Inter-chip Hamming Distance Probability (%) Intra-Chip (w/ masking) µ = , σ = , trails = 500 Inter-Chip (15 Chips,10K Challenges) µ = , σ = Margin = nm, 1.2V, 27ºC, 128 CRPs Hamming Distance Inter-chip HD avg 0.5 due to a flip ratio of 10% margin reliable authentication 23

26 Retention Map vs. Supply Voltage Desired flipping probability range: 9%<P flip <11% 24

27 Retention Map vs. Temperature Desired flipping probability range: 9%<P flip <11% 25

28 Calibration Flow Write half 1 s & half 0 s Read after t wait 1 & 0 ratio equal? Yes Flip ratio in range? Adjust V ref No Adjust t wait No Target retention failure rate: 9%~11% Calibration performed before each authentication request Start Yes 26

29 Intra-chip HD under Different V and T Probability (%) ~1.2V 1.0, 1.1V 0.9V 65nm, 27ºC Before calibration After calibration 0.8V Probability (%) ~85ºC -15ºC 65nm, 1.2V Before Calibration After Calibration 85ºC Hamming Distance (Intra-Chip) Hamming Distance (Intra-Chip) μ and σ of the intra-chip Hamming distance distribution are getting smaller after calibration 0 27

30 Summary A 2T DRAM based Strong PUF demonstrated in 65nm LP CMOS Number of CRPs > A repetitive write-back scheme proposed to enhance PUF uniqueness and stability A calibration scheme mitigates voltage and temperature effects Acknowledgement This work was supported in part by the National Science Foundation under Grant CNS , and in part by the Semiconductor Research Corporation under Contract 2014-TS

A Physical Unclonable Function based on Capacitor Mismatch in a Charge-Redistribution SAR-ADC

A Physical Unclonable Function based on Capacitor Mismatch in a Charge-Redistribution SAR-ADC A Physical Unclonable Function based on Capacitor Mismatch in a Charge-Redistribution SAR-ADC Qianying Tang, Won Ho Choi, Luke Everson, Keshab K. Parhi and Chris H. Kim University of Minnesota Department

More information

Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs

Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Chen Zhou, SarojSatapathy, YingjieLao, KeshabK. Parhiand Chris H. Kim Department of ECE University of Minnesota

More information

Bitline PUF:! Building Native Challenge-Response PUF Capability into Any SRAM. Daniel E. Holcomb Kevin Fu University of Michigan

Bitline PUF:! Building Native Challenge-Response PUF Capability into Any SRAM. Daniel E. Holcomb Kevin Fu University of Michigan Sept 26, 24 Cryptographic Hardware and Embedded Systems Bitline PUF:! Building Native Challenge-Response PUF Capability into Any SRAM Daniel E. Holcomb Kevin Fu University of Michigan Acknowledgment: This

More information

Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs

Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Soft esponse Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Chen Zhou, Saroj Satapathy, Yingjie Lao, Keshab K. Parhi and Chris H. Kim Department of ECE, University of Minnesota,

More information

The DRAM Latency PUF:

The DRAM Latency PUF: The DRAM Latency PUF: Quickly Evaluating Physical Unclonable Functions by Exploiting the Latency-Reliability Tradeoff in Modern Commodity DRAM Devices Jeremie S. Kim Minesh Patel Hasan Hassan Onur Mutlu

More information

www.unique-project.eu Exchange of security-critical data Computing Device generates, stores and processes security-critical information Computing Device 2 However: Cryptographic secrets can be leaked by

More information

IMPROVING THE QUALITY OF A PHYSICAL UNCLONABLE FUNCTION USING CONFIGURABLE RING OSCILLATORS Abhranil Maiti, Patrick Schaumont

IMPROVING THE QUALITY OF A PHYSICAL UNCLONABLE FUNCTION USING CONFIGURABLE RING OSCILLATORS Abhranil Maiti, Patrick Schaumont IMPROVING THE QUALITY OF A PHYSICAL UNCLONABLE FUNCTION USING CONFIGURABLE RING OSCILLATORS Abhranil Maiti, Patrick Schaumont Electrical and Computer Engineering Department Virginia Tech Blacksburg, VA

More information

Moving PUFs out of the lab

Moving PUFs out of the lab Moving PUFs out of the lab Patrick Schaumont 2/3/2012 Research results by Abhranil Maiti, Jeff Casarona, Luke McHale, Logan McDougall, Vikash Gunreddy, Michael Cantrell What is a Physical Unclonable Function?

More information

SRAM-based Physical Unclonable Functions

SRAM-based Physical Unclonable Functions Feb 26, 25 @ Worcester Polytechnic Institute SRAM-based Physical Unclonable Functions Daniel E. Holcomb UMass Amherst Collaborators for these works: Wayne P Burleson Kevin Fu Amir Rahmati Uli Ruhrmair

More information

FPGA PUF Based on Programmable LUT Delays

FPGA PUF Based on Programmable LUT Delays FPGA PUF Based on Programmable LUT Delays Bilal Habib Kris Gaj Jens-Peter Kaps Cryptographic Engineering Research Group (CERG) http://cryptography.gmu.edu Department of ECE, Volgenau School of Engineering,

More information

Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology

Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology Physical Unclonable Functions (PUFs) and Secure Processors Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology 1 Security Challenges How to securely authenticate devices at

More information

Adapting Voltage Ramp-up Time for Temperature Noise Reduction on Memory-based PUFs

Adapting Voltage Ramp-up Time for Temperature Noise Reduction on Memory-based PUFs Adapting Voltage Ramp-up Time for Temperature Noise Reduction on Memory-based PUFs Mafalda Cortez Said Hamdioui Delft University of Technology Faculty of EE, Mathematics and CS Mekelweg 4, 2628 CD Delft,

More information

Secure and Energy Efficient Physical Unclonable Functions

Secure and Energy Efficient Physical Unclonable Functions University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses 1911 - February 2014 Dissertations and Theses 2012 Secure and Energy Efficient Physical Unclonable Functions Sudheendra Srivathsa

More information

Dopingless Transistor based Hybrid Oscillator Arbiter Physical Unclonable Function

Dopingless Transistor based Hybrid Oscillator Arbiter Physical Unclonable Function Dopingless Transistor based Hybrid Oscillator Arbiter Physical Unclonable Function V. P. Yanambaka 1, S. P. Mohanty 2, E. Kougianos 3, P. Sundaravadivel 4 and J. Singh 5 NanoSystem Design Laboratory (NSDL,

More information

Security Evaluation and Enhancement of Bistable Ring PUFs

Security Evaluation and Enhancement of Bistable Ring PUFs ecurity Evaluation and Enhancement of Bistable ing PUFs FIDec, June 23, 25 Xiaolin Xu (), Ulrich ührmair (2) Daniel Holcomb () and Wayne Burleson () () UMass Amherst (2) HGI, U Bochum This material is

More information

Employing Process Variation for Building Chip Identifiers

Employing Process Variation for Building Chip Identifiers Turning Lemons into Lemonade: Employing Process Variation for Building Chip Identifiers Leyla Nazhandali, Electrical and Computer Eng. Department Virginia Tech Outline Part 1: What are PUFs? Identity of

More information

High Reliability PUF using Hot-Carrier Injection Based Response Reinforcement

High Reliability PUF using Hot-Carrier Injection Based Response Reinforcement High Reliability PUF using Hot-Carrier Injection Based Response Reinforcement Mudit Bhargava and Ken Mai Electrical and Computer Engineering Carnegie Mellon University CHES 2013 Key Generation using PUFs

More information

PUF RO (RING OSCILLATOR)

PUF RO (RING OSCILLATOR) PUF RO (RING OSCILLATOR) EEC 492/592, CIS 493 Hands-on Experience on Computer System Security Chan Yu Cleveland State University CIRCUIT PUF - PREVIOUS WORK Ravikanth et. al proposed the first PUF in literature

More information

Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions in Reconfigurable Systems

Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions in Reconfigurable Systems University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses Dissertations and Theses 2016 Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions

More information

v CORRELATION MATRIX

v CORRELATION MATRIX v CORRELATION MATRIX 1. About correlation... 2 2. Using the Correlation Matrix... 3 2.1 The matrix... 3 2.2 Changing the parameters for the calculation... 3 2.3 Highlighting correlation strength... 4 2.4

More information

Microprocessor Based Physical Unclonable Function

Microprocessor Based Physical Unclonable Function Microprocessor Based Physical Unclonable Function Sudeendra kumar K, Sauvagya Sahoo, Abhishek Mahapatra, Ayas Kanta Swain, K.K.Mahapatra kumar.sudeendra@gmail.com, sauvagya.nitrkl@gmail.com, kmaha2@gmail.com

More information

Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions.

Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions. Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions. Roel Maes, Ingrid Verbauwhede 1 Introduction The idea of using intrinsic random physical features to identify

More information

Active and Passive Side-Channel Attacks on Delay Based PUF Designs

Active and Passive Side-Channel Attacks on Delay Based PUF Designs 1 Active and Passive Side-Channel Attacks on Delay Based PUF Designs Georg T. Becker, Raghavan Kumar Abstract Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to traditional

More information

Eliminating the Error Floor for LDPC with NAND Flash

Eliminating the Error Floor for LDPC with NAND Flash Eliminating the Error Floor for LDPC with NAND Flash Shafa Dahandeh, Guangming Lu, Chris Gollnick NGD Systems Aug. 8 18 1 Agenda 3D TLC & QLC NAND Error Characteristics Program/Erase Cycling (Endurance)

More information

Ultra-lightweight and Reconfigurable Tristate Inverter Based Physical Unclonable Function Design

Ultra-lightweight and Reconfigurable Tristate Inverter Based Physical Unclonable Function Design Ultra-lightweight and Reconfigurable Inverter Based Physical Unclonable Function Design Cui, Y., Gu, C., Wang, C., O'Neill, M., & Liu, W. (2018). Ultra-lightweight and Reconfigurable Inverter Based Physical

More information

Reliable and efficient PUF-based key generation using pattern matching

Reliable and efficient PUF-based key generation using pattern matching Reliable and efficient PUF-based key generation using pattern matching The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As

More information

SPARKS Smart Grids Week Stakeholder Workshop

SPARKS Smart Grids Week Stakeholder Workshop SPARKS Smart Grids Week Stakeholder Workshop Smart meter (gateway) authentication and key management using hardware PUFs Physical structures are unique every physical object is unique, has a specific fingerprint

More information

RRAM-based PUF: Design and Applications in Cryptography. Ayush Shrivastava

RRAM-based PUF: Design and Applications in Cryptography. Ayush Shrivastava RRAM-based PUF: Design and Applications in Cryptography by Ayush Shrivastava A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science Approved July 2015 by the Graduate

More information

Novel Reconfigurable Silicon Physical Unclonable Functions

Novel Reconfigurable Silicon Physical Unclonable Functions Novel Reconfigurable Silicon Physical Unclonable Functions Yingjie Lao and Keshab K. Parhi epartment of Electrical and Computer Engineering, University of Minnesota, Twin Cities {laoxx25, parhi}@umn.edu

More information

A PUF Design for Secure FPGA-Based Embedded Systems

A PUF Design for Secure FPGA-Based Embedded Systems A PUF Design for Secure FPGA-Based Embedded Systems author line author line2 author line3 Abstract The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application

More information

A PUF Design for Secure FPGA-Based Embedded Systems

A PUF Design for Secure FPGA-Based Embedded Systems A PUF Design for Secure FPGA-Based Embedded Systems Jason H. Anderson Department of Electrical and Computer Engineering University of Toronto Toronto, Ontario, Canada e-mail: janders@eecg.toronto.edu Abstract

More information

Physical Unclonable Functions and Applications: A Tutorial

Physical Unclonable Functions and Applications: A Tutorial INVITED PAPER Physical Unclonable Functions and Applications: A Tutorial This paper is a tutorial on ongoing work in physical-disorder-based security, security analysis, and implementation choices. By

More information

Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC

Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.

More information

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser

More information

AFRL-RI-RS-TR

AFRL-RI-RS-TR AFRL-RI-RS-TR-2014-018 IC PIRACY PROTECTION BY APUF AND LOGIC OBFUSCATION RICE UNIVERSITY JANUARY 2014 FINAL TECHNICAL REPORT STINFO COPY AIR FORCE RESEARCH LABORATORY INFORMATION DIRECTORATE AIR FORCE

More information

Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning

Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, VOL. X, NO. X, DECEMBER 213 1 Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning Joonho Kong, Member, IEEE, and Farinaz

More information

ASML 2008 First Quarter Results

ASML 2008 First Quarter Results ASML 2008 First Quarter Results ASML continues to execute its leadership strategy and expects gradual order pick-up April 16, 2008 / Slide 1 Safe Harbor "Safe Harbor" Statement under the US Private Securities

More information

REPORT DOCUMENTATION PAGE

REPORT DOCUMENTATION PAGE REPORT DOCUMENTATION PAGE Form Approved OMB No. 74-88 The public reporting burden for this collection of information is estimated to average hour per response, including the time for reviewing instructions,

More information

Application of Importance Sampling using Contaminated Normal Distribution to Multidimensional Variation Analysis

Application of Importance Sampling using Contaminated Normal Distribution to Multidimensional Variation Analysis 1, 2 1 3, 4 1 3 1 Monte Carlo g(x) g(x) g(x) g(x) g(x) / 6-24 SRAM Monte Carlo 2 5 Application of Importance Sampling using Contaminated Normal Distribution to Multidimensional Variation Analysis Shiho

More information

Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels

Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels Sheng Wei * James B. Wendt * Ani Nahapetian * Miodrag Potkonjak * * University of California, Los Angeles

More information

MT4 turbo Correlation Matrix

MT4 turbo Correlation Matrix MT4 turbo Correlation Matrix 1. About correlation... 2 2. Using the Correlation Matrix... 3 2.1 The matrix... 3 2.2 Changing the parameters for the calculation... 4 2.3 Highlighting correlation strength...

More information

MiCOM P443-6/P543-7/P841

MiCOM P443-6/P543-7/P841 MiCOM P443-6/P543-7/P841 Release Notes P443-6/P543-7/P841 Upgrade Platform Hardware Version: M, P Platform Software Version: 75, 65, 45 Publication Reference: P443-6/P543-7/P841-RNC1-TM-EN-1 ALSTOM 2013.

More information

Bits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage

Bits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage Chapter 1: Data Storage Computer Science: An Overview by J. Glenn Brookshear Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns

More information

ASML Q1 net sales in line with guidance at 1.65 billion, gross margin 47.2%

ASML Q1 net sales in line with guidance at 1.65 billion, gross margin 47.2% ASML Q1 net sales in line with guidance at 1.65 billion, gross margin 47.2% ASML 2015 First Quarter Results Veldhoven, the Netherlands April 15, 2015 Forward looking statements This document contains statements

More information

Contents. The Binomial Distribution. The Binomial Distribution The Normal Approximation to the Binomial Left hander example

Contents. The Binomial Distribution. The Binomial Distribution The Normal Approximation to the Binomial Left hander example Contents The Binomial Distribution The Normal Approximation to the Binomial Left hander example The Binomial Distribution When you flip a coin there are only two possible outcomes - heads or tails. This

More information

Q Financial Results

Q Financial Results Q1 2008 Financial Results STMicroelectronics Global Presence* Q108 Revenues = $2.48B Q108 Revenues (ex Flash) = $2.18B 12% North America Carrollton Phoenix Malta Morocco 30% Europe 25% Greater China France

More information

Example. Security of Bistable Ring PUF

Example. Security of Bistable Ring PUF Example Challenge bits select weights, stage index determines signs Response tells whether sum is negative or positive Additive delay model (like Arbiter PUF) t 0 b 1 + t 2 t 3 + b 4 b 5 + t 6 t 7 1 0

More information

3. Instructions. Figure 1. Schematic of IRD1011-A Evaluation Board

3. Instructions. Figure 1. Schematic of IRD1011-A Evaluation Board IRD1011-A Rev.0.0 1. General Description IRD1011-A is an evaluation board for IR1011 which is a small mid-infrared photo diode made of InSb. IR1011 is applicable to carbon dioxide or flame detection. 2.

More information

4Q.2013 Investor Conference

4Q.2013 Investor Conference Inotera Memories, Inc. 4Q.2013 Investor Conference Charles Kau, Chairman Scott Meikle, President Peter Shen, CFO 28 th January, 2014 AGENDA Highlights Financial i Review Operations & Outlook Q & A 2 Disclaimer

More information

Statistical Static Timing Analysis: How simple can we get?

Statistical Static Timing Analysis: How simple can we get? Statistical Static Timing Analysis: How simple can we get? Chirayu Amin, Noel Menezes *, Kip Killpack *, Florentin Dartu *, Umakanta Choudhury *, Nagib Hakim *, Yehea Ismail ECE Department Northwestern

More information

Lightweight and Secure PUF Key Storage Using Limits of Machine Learning

Lightweight and Secure PUF Key Storage Using Limits of Machine Learning Lightweight and Secure PUF Key Storage Using Limits of Machine Learning Meng-Day (Mandel) Yu 1, David M Raihi 1, Richard Sowell 1, and Srinivas Devadas 2 1 Verayo Inc., San Jose, CA, USA {myu,david,rsowell}@verayo.com

More information

How to Generate Repeatable Keys Using Physical Unclonable Functions

How to Generate Repeatable Keys Using Physical Unclonable Functions Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search Nathan

More information

Financial Results. Fourth Quarter Fiscal 2016

Financial Results. Fourth Quarter Fiscal 2016 Financial Results Fourth Quarter Fiscal 2016 2016 Micron Technology, Inc. All rights reserved. Information, products, and/or specifications are subject to change without notice. All information is provided

More information

Rewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E8 Lattice

Rewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E8 Lattice Rewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E Lattice Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan Workshop on Application

More information

Stat511 Additional Materials

Stat511 Additional Materials Binomial Random Variable Stat511 Additional Materials The first discrete RV that we will discuss is the binomial random variable. The binomial random variable is a result of observing the outcomes from

More information

Lecture # 24. Prof. John W. Sutherland. Oct. 21, 2005

Lecture # 24. Prof. John W. Sutherland. Oct. 21, 2005 Lecture # 24 Prof. John W. Sutherland Oct. 21, 2005 Process Capability The extent to which a process produces parts that meet design intent. Most often, how well the process meets the engineering specifications.

More information

Realization of MUX-Based PUF for low power applications

Realization of MUX-Based PUF for low power applications IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 6, Ver. IV (Nov.-Dec.2016), PP 33-43 www.iosrjournals.org Realization of MUX-Based

More information

ASML confirms full-year sales guidance, supported by solid backlog

ASML confirms full-year sales guidance, supported by solid backlog ASML confirms full-year sales guidance, supported by solid backlog ASML 2014 Third Quarter Results Veldhoven, the Netherlands October 15, 2014 Forward looking statements This document contains statements

More information

Financial Results FQ2 2019

Financial Results FQ2 2019 Financial Results FQ2 2019 2019 Micron Technology, Inc. All rights reserved. Information, products, and/or specifications are subject to change without notice. All information is provided on an AS IS basis

More information

A Pattern Matching Approach to Map Cognitive Domain Ontologies to the IBM TrueNorth Processor

A Pattern Matching Approach to Map Cognitive Domain Ontologies to the IBM TrueNorth Processor A Pattern Matching Approach to Map Cognitive Domain Ontologies to the IBM TrueNorth Processor CCAA 217 Nayim Rahman 1, Tanvir Atahary 1, Tarek Taha 1, and Scott A. Douglass 2 1 Electrical and Computer

More information

PUF Design - User Interface

PUF Design - User Interface PUF Design - User Interface September 27, 2011 1 Introduction Design an efficient Physical Unclonable Functions (PUF): PUFs are low-cost security primitives required to protect intellectual properties

More information

The good, the bad and the statistical

The good, the bad and the statistical The good, the bad and the statistical Noel Menezes Strategic CAD Labs Design and Technology Solutions Intel Corp. Acknowledgements Keith Bowman Yossi Abulafia Steve Burns Mahesh Ketkar Vivek De Jim Tschanz

More information

Have you ever wondered whether it would be worth it to buy a lottery ticket every week, or pondered on questions such as If I were offered a choice

Have you ever wondered whether it would be worth it to buy a lottery ticket every week, or pondered on questions such as If I were offered a choice Section 8.5: Expected Value and Variance Have you ever wondered whether it would be worth it to buy a lottery ticket every week, or pondered on questions such as If I were offered a choice between a million

More information

Combining Differential Privacy and Secure Multiparty Computation

Combining Differential Privacy and Secure Multiparty Computation Combining Differential Privacy and Secure Multiparty Computation Martin Pettai, Peeter Laud {martin.pettai peeter.laud}@cyber.ee December 11th, 2015 Introduction Problem Institutions have data about individuals

More information

Class 11. Daniel B. Rowe, Ph.D. Department of Mathematics, Statistics, and Computer Science. Marquette University MATH 1700

Class 11. Daniel B. Rowe, Ph.D. Department of Mathematics, Statistics, and Computer Science. Marquette University MATH 1700 Class 11 Daniel B. Rowe, Ph.D. Department of Mathematics, Statistics, and Computer Science Copyright 2017 by D.B. Rowe 1 Agenda: Recap Chapter 5.3 continued Lecture 6.1-6.2 Go over Eam 2. 2 5: Probability

More information

400G-PSM4: Options for 500m Reach Interconnects

400G-PSM4: Options for 500m Reach Interconnects 400G-PSM4: Options for 500m Reach Interconnects Brian Welch www.luxtera.com Overview A comparison of three prospective solutions for 400G interconnects up to 500m 2λx8x25GBaud- 2λx8x50GBaud-NRZ 1λx4x50GBaud-

More information

MATH 446/546 Homework 1:

MATH 446/546 Homework 1: MATH 446/546 Homework 1: Due September 28th, 216 Please answer the following questions. Students should type there work. 1. At time t, a company has I units of inventory in stock. Customers demand the

More information

NORTH CAROLINA STATE UNIVERSITY Raleigh, North Carolina

NORTH CAROLINA STATE UNIVERSITY Raleigh, North Carolina ./. ::'-," SUBGROUP SIZE DESIGN AND SOME COMPARISONS OF Q(X) crrarts WITH CLASSICAL X CHARTS by Charles P. Quesenberry Institute of Statistics Mimeo Series Number 2233 September, 1992 NORTH CAROLINA STATE

More information

EE6361 : Importance Sampling

EE6361 : Importance Sampling EE6361 : Importance Sampling Electrical Engineering Department IIT Madras Janakiraman Viraraghavan Agenda Yield analysis in memories Statistical Compact Model Traditional Monte-Carlo Limitations of Monte-Carlo

More information

3.6V / 2600mAh Primary Lithium x 0.85 (6 cm x 2.1 cm) 1.0 oz (28 gr) -25 C to 65 C. Bluetooth Low Energy dbm.

3.6V / 2600mAh Primary Lithium x 0.85 (6 cm x 2.1 cm) 1.0 oz (28 gr) -25 C to 65 C. Bluetooth Low Energy dbm. SPECIFICATION SHEET ibeek VER 1.3 HARDWARE SPECIFICATION Battery Size Weight Temperature Range Bluetooth Type Bluetooth Sensitivity Bluetooth Max Power Output Bluetooth Antena Bluetooth Frequency Bluetooth

More information

Fig. 1. Min-Max Timing Simulation 1, 3 1, 2 1, 2 1, , 3 3, 4

Fig. 1. Min-Max Timing Simulation 1, 3 1, 2 1, 2 1, , 3 3, 4 2009 27th IEEE VLSI Test Symposium Output Hazard-Free Transition Delay Fault Test Generation Sreekumar Menon 1, Adit D. Singh 2, Vishwani Agrawal 2 1 Advanced Micro Devices 7171 Southwest Parkway Austin,

More information

A New Redundancy Strategy for High-Availability Power Systems

A New Redundancy Strategy for High-Availability Power Systems Kevin Covi IBM STG High-End Server Development A New Redundancy Strategy for High-Availability Power Systems Outline RAS Philosophy Review Power 6 Traditional approach Power 7 Hybrid approach Load lines

More information

Q1 FY2019 (April 1, 2018 June 30, 2018) Financial Announcement

Q1 FY2019 (April 1, 2018 June 30, 2018) Financial Announcement Q1 FY219 (April 1, 218 June 3, 218) Financial Announcement July 26, 218 Agenda: Q1 FY219 Consolidated Financial Summary Ken Sasagawa, Vice President, Accounting Dept. Business Environment and Financial

More information

Survey of Bitcoin Mixing Services: Tracing Anonymous Bitcoins. White Paper. September 2015 novetta.com Copyright 2015, Novetta, LLC.

Survey of Bitcoin Mixing Services: Tracing Anonymous Bitcoins. White Paper. September 2015 novetta.com Copyright 2015, Novetta, LLC. Survey of Bitcoin Mixing Services: Tracing Anonymous Bitcoins White Paper September 2015 novetta.com Copyright 2015, Novetta, LLC. Survey of Bitcoin Mixing Services: Tracing Anonymous Bitcoins 1 INTRODUCTION

More information

Chapter 9. Idea of Probability. Randomness and Probability. Basic Practice of Statistics - 3rd Edition. Chapter 9 1. Introducing Probability

Chapter 9. Idea of Probability. Randomness and Probability. Basic Practice of Statistics - 3rd Edition. Chapter 9 1. Introducing Probability Chapter 9 Introducing Probability BPS - 3rd Ed. Chapter 9 1 Idea of Probability Probability is the science of chance behavior Chance behavior is unpredictable in the short run but has a regular and predictable

More information

Section 3.1: Discrete Event Simulation

Section 3.1: Discrete Event Simulation Section 3.1: Discrete Event Simulation Discrete-Event Simulation: A First Course c 2006 Pearson Ed., Inc. 0-13-142917-5 Discrete-Event Simulation: A First Course Section 3.1: Discrete Event Simulation

More information

EE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis

EE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis EE115C Spring 2013 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-

More information

Lecture 3: Review of Probability, MATLAB, Histograms

Lecture 3: Review of Probability, MATLAB, Histograms CS 4980/6980: Introduction to Data Science c Spring 2018 Lecture 3: Review of Probability, MATLAB, Histograms Instructor: Daniel L. Pimentel-Alarcón Scribed and Ken Varghese This is preliminary work and

More information

Q2 FY2018 (July - September 2017) Financial Announcement

Q2 FY2018 (July - September 2017) Financial Announcement FY218 (July - September 217) Financial Announcement October 31, 217 Agenda: FY218 Consolidated Financial Summary Tetsuro Hori, Representative Director, CFO, Executive Vice President Business Environment

More information

Basic Procedure for Histograms

Basic Procedure for Histograms Basic Procedure for Histograms 1. Compute the range of observations (min. & max. value) 2. Choose an initial # of classes (most likely based on the range of values, try and find a number of classes that

More information

Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching

Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching Received 10 May 2013; revised 9 October 2013; accepted 22 December 2013. Date of publication xx xxx xxxx; date of current version xx xxx xxxx. Digital Object Identifier 10.1109/TETC.2014.2300635 Robust

More information

value BE.104 Spring Biostatistics: Distribution and the Mean J. L. Sherley

value BE.104 Spring Biostatistics: Distribution and the Mean J. L. Sherley BE.104 Spring Biostatistics: Distribution and the Mean J. L. Sherley Outline: 1) Review of Variation & Error 2) Binomial Distributions 3) The Normal Distribution 4) Defining the Mean of a population Goals:

More information

GL Budgets. Account Budget and Forecast. Account Budgets and Forecasts Menu

GL Budgets. Account Budget and Forecast. Account Budgets and Forecasts Menu Account Budget and Forecast The Account Budget and Forecast function allows you to enter and maintain an unlimited number of budgets and/or forecasts values and types. When setting up the account budgets

More information

System Simulation Chapter 2: Simulation Examples

System Simulation Chapter 2: Simulation Examples System Simulation Chapter 2: Simulation Examples Fatih Cavdur fatihcavdur@uludag.edu.tr March 29, 21 Introduction Several examples of simulation that can be performed by devising a simulation table either

More information

Chapter 1: Data Storage

Chapter 1: Data Storage Chapter 1: Data Storage Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1: Data Storage 1.1 Bits and

More information

Infineon reports Third Quarter Results for Fiscal Year 2003

Infineon reports Third Quarter Results for Fiscal Year 2003 Infineon reports Third Quarter Results for Fiscal Year 2003 Third quarter revenues were Euro 1.47 billion flat sequentially and increasing 11 percent year-on-year - mainly driven by increased sales in

More information

A Heuristic Method for Statistical Digital Circuit Sizing

A Heuristic Method for Statistical Digital Circuit Sizing A Heuristic Method for Statistical Digital Circuit Sizing Stephen Boyd Seung-Jean Kim Dinesh Patil Mark Horowitz Microlithography 06 2/23/06 Statistical variation in digital circuits growing in importance

More information

MOLONEY A.M. SYSTEMS THE FINANCIAL MODELLING MODULE A BRIEF DESCRIPTION

MOLONEY A.M. SYSTEMS THE FINANCIAL MODELLING MODULE A BRIEF DESCRIPTION MOLONEY A.M. SYSTEMS THE FINANCIAL MODELLING MODULE A BRIEF DESCRIPTION Dec 2005 1.0 Summary of Financial Modelling Process: The Moloney Financial Modelling software contained within the excel file Model

More information

the number of correct answers on question i. (Note that the only possible values of X i

the number of correct answers on question i. (Note that the only possible values of X i 6851_ch08_137_153 16/9/02 19:48 Page 137 8 8.1 (a) No: There is no fixed n (i.e., there is no definite upper limit on the number of defects). (b) Yes: It is reasonable to believe that all responses are

More information

RELATIVE CURRENCY STRENGTH -ADDON-

RELATIVE CURRENCY STRENGTH -ADDON- RELATIVE CURRENCY STRENGTH -ADDON- TABLE OF CONTENTS INSTRUCTIONS FOR PACKAGE INSTALLATION 3 USING RELATIVE CURRENCY STRENGTH (RCS) 4 PARAMETERS 4 SIGNALS 5 2 INSTRUCTIONS FOR PACKAGE INSTALLATION 1. As

More information

Chapter 1 Discussion Problem Solutions D1. D2. D3. D4. D5.

Chapter 1 Discussion Problem Solutions D1. D2. D3. D4. D5. Chapter 1 Discussion Problem Solutions D1. Reasonable suggestions at this stage include: compare the average age of those laid off with the average age of those retained; compare the proportion of those,

More information

Quantitative Trading System For The E-mini S&P

Quantitative Trading System For The E-mini S&P AURORA PRO Aurora Pro Automated Trading System Aurora Pro v1.11 For TradeStation 9.1 August 2015 Quantitative Trading System For The E-mini S&P By Capital Evolution LLC Aurora Pro is a quantitative trading

More information

ASML 2007 Annual and Fourth Quarter Results

ASML 2007 Annual and Fourth Quarter Results ASML 2007 Annual and Fourth Quarter Results Technology leadership to provide robust H1 sales and profit amid market uncertainty January 16, 2008 / Slide 1 Safe Harbor Safe Harbor Statement under the U.S.

More information

On the Number of Permutations Avoiding a Given Pattern

On the Number of Permutations Avoiding a Given Pattern On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2

More information

CTL.SC1x -Supply Chain & Logistics Fundamentals. Time Series Analysis

CTL.SC1x -Supply Chain & Logistics Fundamentals. Time Series Analysis CTL.SC1x -Supply Chain & Logistics Fundamentals Time Series Analysis Demand Sales By Month What do you notice? 2 Demand Sales by Week 3 Demand Sales by Day 4 Demand - Seasonality Sales also differ dramatically

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distribution January 31, 2018 Contents The Binomial Distribution The Normal Approximation to the Binomial The Binomial Hypothesis Test Computing Binomial Probabilities in R 30 Problems The

More information

Square D Modbus Solution: Altivar 58 VFD

Square D Modbus Solution: Altivar 58 VFD Point Map November 1, 2004 Systems Integration Square D Modbus Solution: Altivar 58 VFD Table 1. Altivar 58 VFD Point Map, Application 4509. 1 LAO Slave Address 1to247 2 LAI Application Number 4509 3 LDI

More information

3.6V / 2600mAh Primary Lithium x 0.85 (60mm x 21mm) 1.0 oz (28 gr) -30 C to +77 C. Bluetooth Low Energy dBm. +5dBm. 1Mbit/s / 2Mbit/s*

3.6V / 2600mAh Primary Lithium x 0.85 (60mm x 21mm) 1.0 oz (28 gr) -30 C to +77 C. Bluetooth Low Energy dBm. +5dBm. 1Mbit/s / 2Mbit/s* SPECIFICATION SHEET BEEKs Industrial VER 1.6 HARDWARE SPECIFICATION Battery Size Weight Temperature Range Bluetooth Type Bluetooth Sensitivity Bluetooth Max Power Output Bluetooth Antenna Frequency Supported

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distribution January 31, 2019 Contents The Binomial Distribution The Normal Approximation to the Binomial The Binomial Hypothesis Test Computing Binomial Probabilities in R 30 Problems The

More information

Bitcoin Ninjas 'Ninja Signals' Buy/Sell Alerts & Backtesting TradingView Script

Bitcoin Ninjas 'Ninja Signals' Buy/Sell Alerts & Backtesting TradingView Script Bitcoin Ninjas 'Ninja Signals' Buy/Sell Alerts & Backtesting TradingView Script (for Cryptocurrencies, Forex, GunBot, ProfitTrailer, Autoview, manual or automatic trading, and more) Allows users to easily

More information