|
[1] S. S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty, and R. Karri, “Security assessment of cyberphysical digital microfluidic biochips,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 13, pp. 445–458, 2016. [2] G. E. Suh and S. Devadas, “Physical unclonable functions for device authentication and secret key generation,” in Proceedings of ACM/IEEE Design Automation Conference, pp. 9–14, 2007. [3] J. Zhang, Y. Lin, Y. Lyu, and G. Qu, “A puf-fsm binding scheme for fpga ip protection and pay-per-device licensing,” IEEE Transactions on Information Forensics and Security, vol. 10, pp. 1137–1150, 2015. [4] “Duke microfluidics lab,” Available: http://microfluidics.ee.duke.edu/. [5] F. Su, K. Chakrabarty, and R. B. Fair, “Microfluidics-based biochips: technology issues, implementation platforms, and design-automation challenges,” Proceedings of IEEE/ACM International Conference on Computer-Aided Design, vol. 25, pp. 211– 223, 2006. [6] R. B. Fair, “Digital microfluidics: is a true lab-on-a-chip possible?,” Microfluidics and Nanofluidics, vol. 3, pp. 245–281, 2007. [7] R. Sista, Z. Hua, P. Thwar, A. Sudarsan, V. Srinivasan, A. Eckhardt, M. Pollack, and V. Pamula, “Development of a digital microfluidic platform for point of care testing,” Lab on a Chip, vol. 8, pp. 2091–2104, 2008. [8] M. Pollack, A. Shenderov, and R. Fair, “Electrowetting-based actuation of droplets for integrated microfluidics,” Lab on a Chip, vol. 2, pp. 96–101, 2002. [9] T.-Y. Ho, K. Chakrabarty, and P. Pop, “Digital microfluidic biochips: recent research and emerging challenges,” in Proceedings of IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis, pp. 335–343, 2011. [10] “Illumina neoprep library prep system,” Available: http://www.illumina.com/systems/neopreplibrarysystem.html/. [11] “Biochips market, type (dna chip (genomics, drug discovery, gene expression) labon- a-chip (ivd & poc, proteomics), protein chips), end user (academics institutes, diagnostics centers), fabrication technology (microarrays, microfluidics) - forecast to 2020,” Available: http://www.marketsandmarkets.com/MarketReports/biochipsadvancedtechnologiesandglobalmarket54. html/. [12] S. S. Ali, M. Ibrahim, J. Rajendran, O. Sinanoglu, and K. Chakrabarty, “Supply-chain security of digital microfluidic biochips,” IEEE Transactions on Computers, vol. 49, pp. 36–43, 2016. [13] R. Maes, P. Tuyls, and I. Verbauwhede, “A soft decision helper data algorithm for sram pufs,” in Proceedings of IEEE International Symposium on Information Theory, pp. 2101–2105, 2009. [14] Y. Luo, K. Chakrabarty, and T.-Y. Ho, Hardware/Software Co-Design and Optimization for Cyberphysical Integration in Digital Microfluidic Biochips. Springer, 2015. [15] M. Ibrahim, Z. Li, and K. Chakrabarty, “Advances in design automation techniques for digital-microfluidic biochips,” in Formal Modeling and Verification of Cyber- Physical Systems, pp. 190–223, 2015. [16] J. Song, R. Evans, Y.-Y. Lin, B.-N. Hsu, and R. Fair, “A scaling model for electrowetting-on-dielectric microfluidic actuators,” Microfluidics and Nanofluidics, vol. 7, pp. 75–89, 2009. [17] J.-L. Zhang, G. Qu, Y.-Q. Lv, and Q. Zhou, “A survey on silicon pufs and recent advances in ring oscillator pufs,” Proceedings of Journal of computer science and technology, vol. 29, pp. 664–678, 2014. [18] B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, “Silicon physical random functions,” in Proceedings of ACM Conference on Computer and Communications Security, pp. 148–160, 2002. [19] R. Maes and I. Verbauwhede, “Physically unclonable functions: A study on the state of the art and future research directions,” in Towards Hardware-Intrinsic Security, pp. 3–37, Springer, 2010. [20] R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, “Physical one-way functions,” Science, vol. 297, no. 5589, pp. 2026–2030, 2002. [21] P. Tuyls, G.-J. Schrijen, B. ˇSkori´c, J. Van Geloven, N. Verhaegh, and R. Wolters, “Read-proof hardware from protective coatings,” in International Workshop on Cryptographic Hardware and Embedded Systems, pp. 369–383, Springer, 2006. [22] J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Fpga intrinsic pufs and their use for ip protection,” in International workshop on Cryptographic Hardware and Embedded Systems, pp. 63–80, Springer, 2007. [23] Y. Luo, K. Chakrabarty, and T.-Y. Ho, “Real-time error recovery in cyberphysical digital-microfluidic biochips using a compact dictionary,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 32, pp. 1839–1852, 2013. [24] Y. Alkabani, F. Koushanfar, and M. Potkonjak, “Remote activation of ics for piracy prevention and digital right management,” in Proceedings of IEEE/ACM International Conference on Computer-Aided Design, pp. 674–677, 2007. [25] F. Koushanfar, “Provably secure active ic metering techniques for piracy avoidance and digital rights management,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 51–63, 2012. [26] Y. Zhao, T. Xu, and K. Chakrabarty, “Integrated control-path design and error recovery in the synthesis of digital microfluidic lab-on-chip,” ACM Journal on Emerging Technologies in Computing Systems, vol. 6, p. 11, 2010. [27] U. R¨uhrmair, F. Sehnke, J. S¨olter, G. Dror, S. Devadas, and J. Schmidhuber, “Modeling attacks on physical unclonable functions,” in Proceedings of ACM Conference on Computer and Communications Security, pp. 237–249, 2010. |