J. Ryan Kenny, CPU Technology, Inc.
Until a worthy standard for measuring the algorithmic strength of PUF circuits is introduced, the most effective method of ensuring system security is selecting the proper usage model for implementing a uniqueness technology in the silicon.
A critical area of vulnerability analysis is embedded boot code security. After adding a digital signature or authentication step, however, marketing immediately labels the solution "secure boot." But a closer look is needed to decipher what "secure boot" really means.