A DRAM based Physical Unclonable Function Capable of Generating >10 32 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication
|
|
- Earl Clark
- 6 years ago
- Views:
Transcription
1 A DRAM based Physical Unclonable Function Capable of Generating >10 32 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication Q. Tang, C. Zhou, *W. Choi, *G. Kang, *J. Park, K. K. Parhi, and C. H. Kim University of Minnesota, Minneapolis, USA *Korea University, Seoul, Korea
2 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 1
3 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 2
4 Physical Unclonable Function (PUF) Fingerprint of chip PUF Inputs Challenge #1 Challenge #2 Numerous input choices Outputs Response #1 Response #2 Challenge #n Response #n Unique and random: Based on inherent process variation Secure: Large # of challenge-response pairs (CRPs) Unique and random responses Challenges Chip #1 Chip #2 Responses #1 Responses #2 4 5
5 Weak PUF vs. Strong PUF Weak PUF: # of CRPs* proportional to # of unit cells Example: SRAM PUF Application: key generation BL WL WL BLB Strong PUF: # of CRPs exponential to # of unit stages (2 n ) Example: MUX arbiter PUF Application: system authentication #1 #n Response S Q SR Latch R Challenge *CRP: Challenge Response Pair 5
6 DRAM Retention Characteristics WL t refresh BL Leakage V storage Vstorage Time Vref Data retention time depends on the leakage current and capacitance of the storage node Refresh required before the cell data flips 3
7 DRAM based PUF Write All 1 s Retention Failure Map Wait > 40μs Data 1 Data 0 Failure locations unique to each chip Retention time adjusted by word line voltage Only weak PUF configuration implemented S. Rosenblatt, et al., JSSC, 2013 (IBM) 4
8 SRAM PUF vs. DRAM PUF SRAM PUF DRAM PUF Schematic WL WL WL Vstorage BL BLB BL Challenge Method Power up VDD Response value = 0 or 1 Vstorage Write '1' Vref Write '0' t wait Time Time Key Features Power off required Weak PUF configuration only Power is kept on Strong PUF configuration possible V, T variation can be compensated 6
9 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 7
10 Proposed 2T DRAM based PUF 2T DRAM WWL (VDD+0.4V) RBL (VDD) 1T1C DRAM WL WBL (GND) V storage V storage RWL (VDD) BL K. Chun, et al., ISSCC 2011, JSSC 2012 Logic compatible Retention time similar to 1T1C t wait = 10.5ms induces 10% 27ºC 8
11 DRAM based Strong PUF Array 2T gain cell RBL SA+Writeback WBL 01 9 IO_SEL RIO WIO Column Decoder (5 bits) WWL RWL Vref Row Decoder (5 bits) Chip IOs
12 Proposed Authentication Scheme Upper Array Input Pattern (128 bits) Unused cells Flipped cells Data 1 Data 0 Step 1: Write a 128 bit pattern to selected upper array Challenge: start location (=512) + input data ( 1 or 0 ) 13
13 Proposed Authentication Scheme Upper Array Input Pattern (128 bits) After 10.5ms Hidden Pattern Unused cells Flipped cells Data 1 Data 0 Step 2: Wait for 10.5ms to induce 10% cell failures Internally generated pattern is hidden to outside world 13
14 Proposed Authentication Scheme Upper Array Input Pattern (128 bits) After 10.5ms Hidden Pattern Unused cells Flipped cells Data 1 Data to 512 Random Mapping Lower Array Step 3: Write hidden pattern to lower array Challenge: mapping information (=Permutation(512, 128)) 13
15 Proposed Authentication Scheme Upper Array Input Pattern (128 bits) After 10.5ms Hidden Pattern Unused cells Flipped cells Data 1 Data to 512 Random Mapping Lower Array After 10.5ms Final Response (128 bits) Step 4: Collect responses from lower array after 10.5ms # of Challenges = Permutation(512, 128) 13
16 Enrollment and Authentication Flow Enrollment Write 1 or 0 DRAM Array No Mask Cell stable? W 1 R? W 0 R? Yes Server 14
17 Enrollment and Authentication Flow Enrollment Write 1 or 0 Authentication Calibration DRAM Array No Mask Cell stable? W 1 R? W 0 R? Yes Server 15
18 Enrollment and Authentication Flow Enrollment Write 1 or 0 Authentication Calibration No Mask DRAM Array Cell stable? W 1 R? W 0 R? Yes Start cell address Input Pattern Write Upper Array Repetitive Read Write-backs Hidden Pattern Challenge Server 16
19 Enrollment and Authentication Flow Enrollment Write 1 or 0 Authentication Calibration No Mask DRAM Array Cell stable? W 1 R? W 0 R? Yes Challenge Start cell address Random Mapping Input Pattern Write Upper Array Repetitive Read Write-backs Hidden Pattern Write Lower Array Repetitive Read Write-backs Response Server 17
20 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 18
21 DRAM PUF Response Distribution Probability (%) Write 1 6.5% 65nm, 1.2V, 27ºC 1K memory cells, 500 trials 84.7% Average Response Stable cells (84.7%) Flipped cells (6.5%) Unstable cells (8.8%) Average response over 500 trials More flip cells (red color bar) desired Few unstable cells (gray color bar) desired 1 After 10.5 ms After 10.5 ms After 10.5 ms
22 Repetitive Write-back Scheme Stable cells Flipped cells One-time read-out Repetitive write-back The flip can happen at any time Unstable cells Weak 1 cell tends to be a strong 0 cell, and vice versa Repetitive write-back = detect flip in repeated test % of stable cells, % of flip cells, % of unstable cells 20
23 Repetitive Write-back Scheme W 1 W 0 Always % 6.5% Always 0 Unstable No write-backs 6.5% 8.8% 7.2% 10 write-backs W 1 W % 11.6% 86.3% 12.7% 83.2% 6.0% 5.2% Unstable Cells (%) nm, 1.2V, 27ºC Write # of write-backs # of flipped cells increases: better uniqueness # of unstable cells decreases: better stability 21
24 Agenda Background Proposed DRAM based Strong PUF Enhancing DRAM PUF Uniqueness and Stability Hamming Distance Measurements Summary 22
25 Intra- and Inter-chip Hamming Distance Probability (%) Intra-Chip (w/ masking) µ = , σ = , trails = 500 Inter-Chip (15 Chips,10K Challenges) µ = , σ = Margin = nm, 1.2V, 27ºC, 128 CRPs Hamming Distance Inter-chip HD avg 0.5 due to a flip ratio of 10% margin reliable authentication 23
26 Retention Map vs. Supply Voltage Desired flipping probability range: 9%<P flip <11% 24
27 Retention Map vs. Temperature Desired flipping probability range: 9%<P flip <11% 25
28 Calibration Flow Write half 1 s & half 0 s Read after t wait 1 & 0 ratio equal? Yes Flip ratio in range? Adjust V ref No Adjust t wait No Target retention failure rate: 9%~11% Calibration performed before each authentication request Start Yes 26
29 Intra-chip HD under Different V and T Probability (%) ~1.2V 1.0, 1.1V 0.9V 65nm, 27ºC Before calibration After calibration 0.8V Probability (%) ~85ºC -15ºC 65nm, 1.2V Before Calibration After Calibration 85ºC Hamming Distance (Intra-Chip) Hamming Distance (Intra-Chip) μ and σ of the intra-chip Hamming distance distribution are getting smaller after calibration 0 27
30 Summary A 2T DRAM based Strong PUF demonstrated in 65nm LP CMOS Number of CRPs > A repetitive write-back scheme proposed to enhance PUF uniqueness and stability A calibration scheme mitigates voltage and temperature effects Acknowledgement This work was supported in part by the National Science Foundation under Grant CNS , and in part by the Semiconductor Research Corporation under Contract 2014-TS
A Physical Unclonable Function based on Capacitor Mismatch in a Charge-Redistribution SAR-ADC
A Physical Unclonable Function based on Capacitor Mismatch in a Charge-Redistribution SAR-ADC Qianying Tang, Won Ho Choi, Luke Everson, Keshab K. Parhi and Chris H. Kim University of Minnesota Department
More informationSoft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs
Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Chen Zhou, SarojSatapathy, YingjieLao, KeshabK. Parhiand Chris H. Kim Department of ECE University of Minnesota
More informationBitline PUF:! Building Native Challenge-Response PUF Capability into Any SRAM. Daniel E. Holcomb Kevin Fu University of Michigan
Sept 26, 24 Cryptographic Hardware and Embedded Systems Bitline PUF:! Building Native Challenge-Response PUF Capability into Any SRAM Daniel E. Holcomb Kevin Fu University of Michigan Acknowledgment: This
More informationSoft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs
Soft esponse Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Chen Zhou, Saroj Satapathy, Yingjie Lao, Keshab K. Parhi and Chris H. Kim Department of ECE, University of Minnesota,
More informationThe DRAM Latency PUF:
The DRAM Latency PUF: Quickly Evaluating Physical Unclonable Functions by Exploiting the Latency-Reliability Tradeoff in Modern Commodity DRAM Devices Jeremie S. Kim Minesh Patel Hasan Hassan Onur Mutlu
More informationwww.unique-project.eu Exchange of security-critical data Computing Device generates, stores and processes security-critical information Computing Device 2 However: Cryptographic secrets can be leaked by
More informationIMPROVING THE QUALITY OF A PHYSICAL UNCLONABLE FUNCTION USING CONFIGURABLE RING OSCILLATORS Abhranil Maiti, Patrick Schaumont
IMPROVING THE QUALITY OF A PHYSICAL UNCLONABLE FUNCTION USING CONFIGURABLE RING OSCILLATORS Abhranil Maiti, Patrick Schaumont Electrical and Computer Engineering Department Virginia Tech Blacksburg, VA
More informationMoving PUFs out of the lab
Moving PUFs out of the lab Patrick Schaumont 2/3/2012 Research results by Abhranil Maiti, Jeff Casarona, Luke McHale, Logan McDougall, Vikash Gunreddy, Michael Cantrell What is a Physical Unclonable Function?
More informationSRAM-based Physical Unclonable Functions
Feb 26, 25 @ Worcester Polytechnic Institute SRAM-based Physical Unclonable Functions Daniel E. Holcomb UMass Amherst Collaborators for these works: Wayne P Burleson Kevin Fu Amir Rahmati Uli Ruhrmair
More informationFPGA PUF Based on Programmable LUT Delays
FPGA PUF Based on Programmable LUT Delays Bilal Habib Kris Gaj Jens-Peter Kaps Cryptographic Engineering Research Group (CERG) http://cryptography.gmu.edu Department of ECE, Volgenau School of Engineering,
More informationPhysical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology
Physical Unclonable Functions (PUFs) and Secure Processors Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology 1 Security Challenges How to securely authenticate devices at
More informationAdapting Voltage Ramp-up Time for Temperature Noise Reduction on Memory-based PUFs
Adapting Voltage Ramp-up Time for Temperature Noise Reduction on Memory-based PUFs Mafalda Cortez Said Hamdioui Delft University of Technology Faculty of EE, Mathematics and CS Mekelweg 4, 2628 CD Delft,
More informationSecure and Energy Efficient Physical Unclonable Functions
University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses 1911 - February 2014 Dissertations and Theses 2012 Secure and Energy Efficient Physical Unclonable Functions Sudheendra Srivathsa
More informationDopingless Transistor based Hybrid Oscillator Arbiter Physical Unclonable Function
Dopingless Transistor based Hybrid Oscillator Arbiter Physical Unclonable Function V. P. Yanambaka 1, S. P. Mohanty 2, E. Kougianos 3, P. Sundaravadivel 4 and J. Singh 5 NanoSystem Design Laboratory (NSDL,
More informationSecurity Evaluation and Enhancement of Bistable Ring PUFs
ecurity Evaluation and Enhancement of Bistable ing PUFs FIDec, June 23, 25 Xiaolin Xu (), Ulrich ührmair (2) Daniel Holcomb () and Wayne Burleson () () UMass Amherst (2) HGI, U Bochum This material is
More informationEmploying Process Variation for Building Chip Identifiers
Turning Lemons into Lemonade: Employing Process Variation for Building Chip Identifiers Leyla Nazhandali, Electrical and Computer Eng. Department Virginia Tech Outline Part 1: What are PUFs? Identity of
More informationHigh Reliability PUF using Hot-Carrier Injection Based Response Reinforcement
High Reliability PUF using Hot-Carrier Injection Based Response Reinforcement Mudit Bhargava and Ken Mai Electrical and Computer Engineering Carnegie Mellon University CHES 2013 Key Generation using PUFs
More informationPUF RO (RING OSCILLATOR)
PUF RO (RING OSCILLATOR) EEC 492/592, CIS 493 Hands-on Experience on Computer System Security Chan Yu Cleveland State University CIRCUIT PUF - PREVIOUS WORK Ravikanth et. al proposed the first PUF in literature
More informationVariation Aware Placement for Efficient Key Generation using Physically Unclonable Functions in Reconfigurable Systems
University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses Dissertations and Theses 2016 Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions
More informationv CORRELATION MATRIX
v CORRELATION MATRIX 1. About correlation... 2 2. Using the Correlation Matrix... 3 2.1 The matrix... 3 2.2 Changing the parameters for the calculation... 3 2.3 Highlighting correlation strength... 4 2.4
More informationMicroprocessor Based Physical Unclonable Function
Microprocessor Based Physical Unclonable Function Sudeendra kumar K, Sauvagya Sahoo, Abhishek Mahapatra, Ayas Kanta Swain, K.K.Mahapatra kumar.sudeendra@gmail.com, sauvagya.nitrkl@gmail.com, kmaha2@gmail.com
More informationPhysically Unclonable Functions: a Study on the State of the Art and Future Research Directions.
Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions. Roel Maes, Ingrid Verbauwhede 1 Introduction The idea of using intrinsic random physical features to identify
More informationActive and Passive Side-Channel Attacks on Delay Based PUF Designs
1 Active and Passive Side-Channel Attacks on Delay Based PUF Designs Georg T. Becker, Raghavan Kumar Abstract Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to traditional
More informationEliminating the Error Floor for LDPC with NAND Flash
Eliminating the Error Floor for LDPC with NAND Flash Shafa Dahandeh, Guangming Lu, Chris Gollnick NGD Systems Aug. 8 18 1 Agenda 3D TLC & QLC NAND Error Characteristics Program/Erase Cycling (Endurance)
More informationUltra-lightweight and Reconfigurable Tristate Inverter Based Physical Unclonable Function Design
Ultra-lightweight and Reconfigurable Inverter Based Physical Unclonable Function Design Cui, Y., Gu, C., Wang, C., O'Neill, M., & Liu, W. (2018). Ultra-lightweight and Reconfigurable Inverter Based Physical
More informationReliable and efficient PUF-based key generation using pattern matching
Reliable and efficient PUF-based key generation using pattern matching The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As
More informationSPARKS Smart Grids Week Stakeholder Workshop
SPARKS Smart Grids Week Stakeholder Workshop Smart meter (gateway) authentication and key management using hardware PUFs Physical structures are unique every physical object is unique, has a specific fingerprint
More informationRRAM-based PUF: Design and Applications in Cryptography. Ayush Shrivastava
RRAM-based PUF: Design and Applications in Cryptography by Ayush Shrivastava A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science Approved July 2015 by the Graduate
More informationNovel Reconfigurable Silicon Physical Unclonable Functions
Novel Reconfigurable Silicon Physical Unclonable Functions Yingjie Lao and Keshab K. Parhi epartment of Electrical and Computer Engineering, University of Minnesota, Twin Cities {laoxx25, parhi}@umn.edu
More informationA PUF Design for Secure FPGA-Based Embedded Systems
A PUF Design for Secure FPGA-Based Embedded Systems author line author line2 author line3 Abstract The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application
More informationA PUF Design for Secure FPGA-Based Embedded Systems
A PUF Design for Secure FPGA-Based Embedded Systems Jason H. Anderson Department of Electrical and Computer Engineering University of Toronto Toronto, Ontario, Canada e-mail: janders@eecg.toronto.edu Abstract
More informationPhysical Unclonable Functions and Applications: A Tutorial
INVITED PAPER Physical Unclonable Functions and Applications: A Tutorial This paper is a tutorial on ongoing work in physical-disorder-based security, security analysis, and implementation choices. By
More informationPerformance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC
Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.
More informationIntrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser
More informationAFRL-RI-RS-TR
AFRL-RI-RS-TR-2014-018 IC PIRACY PROTECTION BY APUF AND LOGIC OBFUSCATION RICE UNIVERSITY JANUARY 2014 FINAL TECHNICAL REPORT STINFO COPY AIR FORCE RESEARCH LABORATORY INFORMATION DIRECTORATE AIR FORCE
More informationProcessor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, VOL. X, NO. X, DECEMBER 213 1 Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning Joonho Kong, Member, IEEE, and Farinaz
More informationASML 2008 First Quarter Results
ASML 2008 First Quarter Results ASML continues to execute its leadership strategy and expects gradual order pick-up April 16, 2008 / Slide 1 Safe Harbor "Safe Harbor" Statement under the US Private Securities
More informationREPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB No. 74-88 The public reporting burden for this collection of information is estimated to average hour per response, including the time for reviewing instructions,
More informationApplication of Importance Sampling using Contaminated Normal Distribution to Multidimensional Variation Analysis
1, 2 1 3, 4 1 3 1 Monte Carlo g(x) g(x) g(x) g(x) g(x) / 6-24 SRAM Monte Carlo 2 5 Application of Importance Sampling using Contaminated Normal Distribution to Multidimensional Variation Analysis Shiho
More informationReverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels Sheng Wei * James B. Wendt * Ani Nahapetian * Miodrag Potkonjak * * University of California, Los Angeles
More informationMT4 turbo Correlation Matrix
MT4 turbo Correlation Matrix 1. About correlation... 2 2. Using the Correlation Matrix... 3 2.1 The matrix... 3 2.2 Changing the parameters for the calculation... 4 2.3 Highlighting correlation strength...
More informationMiCOM P443-6/P543-7/P841
MiCOM P443-6/P543-7/P841 Release Notes P443-6/P543-7/P841 Upgrade Platform Hardware Version: M, P Platform Software Version: 75, 65, 45 Publication Reference: P443-6/P543-7/P841-RNC1-TM-EN-1 ALSTOM 2013.
More informationBits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage
Chapter 1: Data Storage Computer Science: An Overview by J. Glenn Brookshear Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns
More informationASML Q1 net sales in line with guidance at 1.65 billion, gross margin 47.2%
ASML Q1 net sales in line with guidance at 1.65 billion, gross margin 47.2% ASML 2015 First Quarter Results Veldhoven, the Netherlands April 15, 2015 Forward looking statements This document contains statements
More informationContents. The Binomial Distribution. The Binomial Distribution The Normal Approximation to the Binomial Left hander example
Contents The Binomial Distribution The Normal Approximation to the Binomial Left hander example The Binomial Distribution When you flip a coin there are only two possible outcomes - heads or tails. This
More informationQ Financial Results
Q1 2008 Financial Results STMicroelectronics Global Presence* Q108 Revenues = $2.48B Q108 Revenues (ex Flash) = $2.18B 12% North America Carrollton Phoenix Malta Morocco 30% Europe 25% Greater China France
More informationExample. Security of Bistable Ring PUF
Example Challenge bits select weights, stage index determines signs Response tells whether sum is negative or positive Additive delay model (like Arbiter PUF) t 0 b 1 + t 2 t 3 + b 4 b 5 + t 6 t 7 1 0
More information3. Instructions. Figure 1. Schematic of IRD1011-A Evaluation Board
IRD1011-A Rev.0.0 1. General Description IRD1011-A is an evaluation board for IR1011 which is a small mid-infrared photo diode made of InSb. IR1011 is applicable to carbon dioxide or flame detection. 2.
More information4Q.2013 Investor Conference
Inotera Memories, Inc. 4Q.2013 Investor Conference Charles Kau, Chairman Scott Meikle, President Peter Shen, CFO 28 th January, 2014 AGENDA Highlights Financial i Review Operations & Outlook Q & A 2 Disclaimer
More informationStatistical Static Timing Analysis: How simple can we get?
Statistical Static Timing Analysis: How simple can we get? Chirayu Amin, Noel Menezes *, Kip Killpack *, Florentin Dartu *, Umakanta Choudhury *, Nagib Hakim *, Yehea Ismail ECE Department Northwestern
More informationLightweight and Secure PUF Key Storage Using Limits of Machine Learning
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning Meng-Day (Mandel) Yu 1, David M Raihi 1, Richard Sowell 1, and Srinivas Devadas 2 1 Verayo Inc., San Jose, CA, USA {myu,david,rsowell}@verayo.com
More informationHow to Generate Repeatable Keys Using Physical Unclonable Functions
Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search Nathan
More informationFinancial Results. Fourth Quarter Fiscal 2016
Financial Results Fourth Quarter Fiscal 2016 2016 Micron Technology, Inc. All rights reserved. Information, products, and/or specifications are subject to change without notice. All information is provided
More informationRewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E8 Lattice
Rewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E Lattice Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan Workshop on Application
More informationStat511 Additional Materials
Binomial Random Variable Stat511 Additional Materials The first discrete RV that we will discuss is the binomial random variable. The binomial random variable is a result of observing the outcomes from
More informationLecture # 24. Prof. John W. Sutherland. Oct. 21, 2005
Lecture # 24 Prof. John W. Sutherland Oct. 21, 2005 Process Capability The extent to which a process produces parts that meet design intent. Most often, how well the process meets the engineering specifications.
More informationRealization of MUX-Based PUF for low power applications
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 6, Ver. IV (Nov.-Dec.2016), PP 33-43 www.iosrjournals.org Realization of MUX-Based
More informationASML confirms full-year sales guidance, supported by solid backlog
ASML confirms full-year sales guidance, supported by solid backlog ASML 2014 Third Quarter Results Veldhoven, the Netherlands October 15, 2014 Forward looking statements This document contains statements
More informationFinancial Results FQ2 2019
Financial Results FQ2 2019 2019 Micron Technology, Inc. All rights reserved. Information, products, and/or specifications are subject to change without notice. All information is provided on an AS IS basis
More informationA Pattern Matching Approach to Map Cognitive Domain Ontologies to the IBM TrueNorth Processor
A Pattern Matching Approach to Map Cognitive Domain Ontologies to the IBM TrueNorth Processor CCAA 217 Nayim Rahman 1, Tanvir Atahary 1, Tarek Taha 1, and Scott A. Douglass 2 1 Electrical and Computer
More informationPUF Design - User Interface
PUF Design - User Interface September 27, 2011 1 Introduction Design an efficient Physical Unclonable Functions (PUF): PUFs are low-cost security primitives required to protect intellectual properties
More informationThe good, the bad and the statistical
The good, the bad and the statistical Noel Menezes Strategic CAD Labs Design and Technology Solutions Intel Corp. Acknowledgements Keith Bowman Yossi Abulafia Steve Burns Mahesh Ketkar Vivek De Jim Tschanz
More informationHave you ever wondered whether it would be worth it to buy a lottery ticket every week, or pondered on questions such as If I were offered a choice
Section 8.5: Expected Value and Variance Have you ever wondered whether it would be worth it to buy a lottery ticket every week, or pondered on questions such as If I were offered a choice between a million
More informationCombining Differential Privacy and Secure Multiparty Computation
Combining Differential Privacy and Secure Multiparty Computation Martin Pettai, Peeter Laud {martin.pettai peeter.laud}@cyber.ee December 11th, 2015 Introduction Problem Institutions have data about individuals
More informationClass 11. Daniel B. Rowe, Ph.D. Department of Mathematics, Statistics, and Computer Science. Marquette University MATH 1700
Class 11 Daniel B. Rowe, Ph.D. Department of Mathematics, Statistics, and Computer Science Copyright 2017 by D.B. Rowe 1 Agenda: Recap Chapter 5.3 continued Lecture 6.1-6.2 Go over Eam 2. 2 5: Probability
More information400G-PSM4: Options for 500m Reach Interconnects
400G-PSM4: Options for 500m Reach Interconnects Brian Welch www.luxtera.com Overview A comparison of three prospective solutions for 400G interconnects up to 500m 2λx8x25GBaud- 2λx8x50GBaud-NRZ 1λx4x50GBaud-
More informationMATH 446/546 Homework 1:
MATH 446/546 Homework 1: Due September 28th, 216 Please answer the following questions. Students should type there work. 1. At time t, a company has I units of inventory in stock. Customers demand the
More informationNORTH CAROLINA STATE UNIVERSITY Raleigh, North Carolina
./. ::'-," SUBGROUP SIZE DESIGN AND SOME COMPARISONS OF Q(X) crrarts WITH CLASSICAL X CHARTS by Charles P. Quesenberry Institute of Statistics Mimeo Series Number 2233 September, 1992 NORTH CAROLINA STATE
More informationEE6361 : Importance Sampling
EE6361 : Importance Sampling Electrical Engineering Department IIT Madras Janakiraman Viraraghavan Agenda Yield analysis in memories Statistical Compact Model Traditional Monte-Carlo Limitations of Monte-Carlo
More information3.6V / 2600mAh Primary Lithium x 0.85 (6 cm x 2.1 cm) 1.0 oz (28 gr) -25 C to 65 C. Bluetooth Low Energy dbm.
SPECIFICATION SHEET ibeek VER 1.3 HARDWARE SPECIFICATION Battery Size Weight Temperature Range Bluetooth Type Bluetooth Sensitivity Bluetooth Max Power Output Bluetooth Antena Bluetooth Frequency Bluetooth
More informationFig. 1. Min-Max Timing Simulation 1, 3 1, 2 1, 2 1, , 3 3, 4
2009 27th IEEE VLSI Test Symposium Output Hazard-Free Transition Delay Fault Test Generation Sreekumar Menon 1, Adit D. Singh 2, Vishwani Agrawal 2 1 Advanced Micro Devices 7171 Southwest Parkway Austin,
More informationA New Redundancy Strategy for High-Availability Power Systems
Kevin Covi IBM STG High-End Server Development A New Redundancy Strategy for High-Availability Power Systems Outline RAS Philosophy Review Power 6 Traditional approach Power 7 Hybrid approach Load lines
More informationQ1 FY2019 (April 1, 2018 June 30, 2018) Financial Announcement
Q1 FY219 (April 1, 218 June 3, 218) Financial Announcement July 26, 218 Agenda: Q1 FY219 Consolidated Financial Summary Ken Sasagawa, Vice President, Accounting Dept. Business Environment and Financial
More informationSurvey of Bitcoin Mixing Services: Tracing Anonymous Bitcoins. White Paper. September 2015 novetta.com Copyright 2015, Novetta, LLC.
Survey of Bitcoin Mixing Services: Tracing Anonymous Bitcoins White Paper September 2015 novetta.com Copyright 2015, Novetta, LLC. Survey of Bitcoin Mixing Services: Tracing Anonymous Bitcoins 1 INTRODUCTION
More informationChapter 9. Idea of Probability. Randomness and Probability. Basic Practice of Statistics - 3rd Edition. Chapter 9 1. Introducing Probability
Chapter 9 Introducing Probability BPS - 3rd Ed. Chapter 9 1 Idea of Probability Probability is the science of chance behavior Chance behavior is unpredictable in the short run but has a regular and predictable
More informationSection 3.1: Discrete Event Simulation
Section 3.1: Discrete Event Simulation Discrete-Event Simulation: A First Course c 2006 Pearson Ed., Inc. 0-13-142917-5 Discrete-Event Simulation: A First Course Section 3.1: Discrete Event Simulation
More informationEE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis
EE115C Spring 2013 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-
More informationLecture 3: Review of Probability, MATLAB, Histograms
CS 4980/6980: Introduction to Data Science c Spring 2018 Lecture 3: Review of Probability, MATLAB, Histograms Instructor: Daniel L. Pimentel-Alarcón Scribed and Ken Varghese This is preliminary work and
More informationQ2 FY2018 (July - September 2017) Financial Announcement
FY218 (July - September 217) Financial Announcement October 31, 217 Agenda: FY218 Consolidated Financial Summary Tetsuro Hori, Representative Director, CFO, Executive Vice President Business Environment
More informationBasic Procedure for Histograms
Basic Procedure for Histograms 1. Compute the range of observations (min. & max. value) 2. Choose an initial # of classes (most likely based on the range of values, try and find a number of classes that
More informationRobust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
Received 10 May 2013; revised 9 October 2013; accepted 22 December 2013. Date of publication xx xxx xxxx; date of current version xx xxx xxxx. Digital Object Identifier 10.1109/TETC.2014.2300635 Robust
More informationvalue BE.104 Spring Biostatistics: Distribution and the Mean J. L. Sherley
BE.104 Spring Biostatistics: Distribution and the Mean J. L. Sherley Outline: 1) Review of Variation & Error 2) Binomial Distributions 3) The Normal Distribution 4) Defining the Mean of a population Goals:
More informationGL Budgets. Account Budget and Forecast. Account Budgets and Forecasts Menu
Account Budget and Forecast The Account Budget and Forecast function allows you to enter and maintain an unlimited number of budgets and/or forecasts values and types. When setting up the account budgets
More informationSystem Simulation Chapter 2: Simulation Examples
System Simulation Chapter 2: Simulation Examples Fatih Cavdur fatihcavdur@uludag.edu.tr March 29, 21 Introduction Several examples of simulation that can be performed by devising a simulation table either
More informationChapter 1: Data Storage
Chapter 1: Data Storage Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1: Data Storage 1.1 Bits and
More informationInfineon reports Third Quarter Results for Fiscal Year 2003
Infineon reports Third Quarter Results for Fiscal Year 2003 Third quarter revenues were Euro 1.47 billion flat sequentially and increasing 11 percent year-on-year - mainly driven by increased sales in
More informationA Heuristic Method for Statistical Digital Circuit Sizing
A Heuristic Method for Statistical Digital Circuit Sizing Stephen Boyd Seung-Jean Kim Dinesh Patil Mark Horowitz Microlithography 06 2/23/06 Statistical variation in digital circuits growing in importance
More informationMOLONEY A.M. SYSTEMS THE FINANCIAL MODELLING MODULE A BRIEF DESCRIPTION
MOLONEY A.M. SYSTEMS THE FINANCIAL MODELLING MODULE A BRIEF DESCRIPTION Dec 2005 1.0 Summary of Financial Modelling Process: The Moloney Financial Modelling software contained within the excel file Model
More informationthe number of correct answers on question i. (Note that the only possible values of X i
6851_ch08_137_153 16/9/02 19:48 Page 137 8 8.1 (a) No: There is no fixed n (i.e., there is no definite upper limit on the number of defects). (b) Yes: It is reasonable to believe that all responses are
More informationRELATIVE CURRENCY STRENGTH -ADDON-
RELATIVE CURRENCY STRENGTH -ADDON- TABLE OF CONTENTS INSTRUCTIONS FOR PACKAGE INSTALLATION 3 USING RELATIVE CURRENCY STRENGTH (RCS) 4 PARAMETERS 4 SIGNALS 5 2 INSTRUCTIONS FOR PACKAGE INSTALLATION 1. As
More informationChapter 1 Discussion Problem Solutions D1. D2. D3. D4. D5.
Chapter 1 Discussion Problem Solutions D1. Reasonable suggestions at this stage include: compare the average age of those laid off with the average age of those retained; compare the proportion of those,
More informationQuantitative Trading System For The E-mini S&P
AURORA PRO Aurora Pro Automated Trading System Aurora Pro v1.11 For TradeStation 9.1 August 2015 Quantitative Trading System For The E-mini S&P By Capital Evolution LLC Aurora Pro is a quantitative trading
More informationASML 2007 Annual and Fourth Quarter Results
ASML 2007 Annual and Fourth Quarter Results Technology leadership to provide robust H1 sales and profit amid market uncertainty January 16, 2008 / Slide 1 Safe Harbor Safe Harbor Statement under the U.S.
More informationOn the Number of Permutations Avoiding a Given Pattern
On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2
More informationCTL.SC1x -Supply Chain & Logistics Fundamentals. Time Series Analysis
CTL.SC1x -Supply Chain & Logistics Fundamentals Time Series Analysis Demand Sales By Month What do you notice? 2 Demand Sales by Week 3 Demand Sales by Day 4 Demand - Seasonality Sales also differ dramatically
More informationThe Binomial Distribution
The Binomial Distribution January 31, 2018 Contents The Binomial Distribution The Normal Approximation to the Binomial The Binomial Hypothesis Test Computing Binomial Probabilities in R 30 Problems The
More informationSquare D Modbus Solution: Altivar 58 VFD
Point Map November 1, 2004 Systems Integration Square D Modbus Solution: Altivar 58 VFD Table 1. Altivar 58 VFD Point Map, Application 4509. 1 LAO Slave Address 1to247 2 LAI Application Number 4509 3 LDI
More information3.6V / 2600mAh Primary Lithium x 0.85 (60mm x 21mm) 1.0 oz (28 gr) -30 C to +77 C. Bluetooth Low Energy dBm. +5dBm. 1Mbit/s / 2Mbit/s*
SPECIFICATION SHEET BEEKs Industrial VER 1.6 HARDWARE SPECIFICATION Battery Size Weight Temperature Range Bluetooth Type Bluetooth Sensitivity Bluetooth Max Power Output Bluetooth Antenna Frequency Supported
More informationThe Binomial Distribution
The Binomial Distribution January 31, 2019 Contents The Binomial Distribution The Normal Approximation to the Binomial The Binomial Hypothesis Test Computing Binomial Probabilities in R 30 Problems The
More informationBitcoin Ninjas 'Ninja Signals' Buy/Sell Alerts & Backtesting TradingView Script
Bitcoin Ninjas 'Ninja Signals' Buy/Sell Alerts & Backtesting TradingView Script (for Cryptocurrencies, Forex, GunBot, ProfitTrailer, Autoview, manual or automatic trading, and more) Allows users to easily
More information