{"id":"https://openalex.org/W6907318747","doi":"https://doi.org/10.21227/axff-kc36","title":"Dataset for the paper \"PUF for the Commons: Enhancing Embedded Security on the OS Level\"","display_name":"Dataset for the paper \"PUF for the Commons: Enhancing Embedded Security on the OS Level\"","publication_year":2023,"publication_date":"2023-07-27","ids":{"openalex":"https://openalex.org/W6907318747","doi":"https://doi.org/10.21227/axff-kc36"},"language":"en","primary_location":{"id":"doi:10.21227/axff-kc36","is_oa":true,"landing_page_url":"https://doi.org/10.21227/axff-kc36","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/axff-kc36","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kietzmann, Peter","orcid":null},"institutions":[{"id":"https://openalex.org/I70451448","display_name":"HAW Hamburg","ror":"https://ror.org/00fkqwx76","country_code":"DE","type":"education","lineage":["https://openalex.org/I70451448"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Kietzmann, Peter","raw_affiliation_strings":["HAW Hamburg"],"affiliations":[{"raw_affiliation_string":"HAW Hamburg","institution_ids":["https://openalex.org/I70451448"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Schmidt, Thomas C.","orcid":null},"institutions":[{"id":"https://openalex.org/I70451448","display_name":"HAW Hamburg","ror":"https://ror.org/00fkqwx76","country_code":"DE","type":"education","lineage":["https://openalex.org/I70451448"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Schmidt, Thomas C.","raw_affiliation_strings":["HAW Hamburg"],"affiliations":[{"raw_affiliation_string":"HAW Hamburg","institution_ids":["https://openalex.org/I70451448"]}]},{"author_position":"last","author":{"id":null,"display_name":"W\u00e4hlisch, Matthias","orcid":null},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"W\u00e4hlisch, Matthias","raw_affiliation_strings":["TU Dresden"],"affiliations":[{"raw_affiliation_string":"TU Dresden","institution_ids":["https://openalex.org/I78650965"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I70451448"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/static-random-access-memory","display_name":"Static random-access memory","score":0.8806999921798706},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6222000122070312},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5640000104904175},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43149998784065247},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.41589999198913574},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4101000130176544},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4016000032424927},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.38510000705718994}],"concepts":[{"id":"https://openalex.org/C68043766","wikidata":"https://www.wikidata.org/wiki/Q267416","display_name":"Static random-access memory","level":2,"score":0.8806999921798706},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6843000054359436},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6222000122070312},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.603600025177002},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5640000104904175},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43149998784065247},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.41589999198913574},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4101000130176544},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4016000032424927},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.38510000705718994},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.3675999939441681},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.3529999852180481},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.35030001401901245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34369999170303345},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34049999713897705},{"id":"https://openalex.org/C2994168587","wikidata":"https://www.wikidata.org/wiki/Q5295","display_name":"Random access memory","level":2,"score":0.3231000006198883},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.28859999775886536},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.2678000032901764},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.265500009059906},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.26420000195503235},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.26260000467300415}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/axff-kc36","is_oa":true,"landing_page_url":"https://doi.org/10.21227/axff-kc36","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/axff-kc36","is_oa":true,"landing_page_url":"https://doi.org/10.21227/axff-kc36","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7381667494773865}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,145],"dataset":[1],"is":[2,20],"supplementary":[3],"material":[4],"for":[5,9,22,30,92,158],"our":[6,97,143],"paper":[7],"\"PUF":[8],"the":[10,16,23,71,89,107,123,133,140,160,180,214],"Commons:":[11],"Enhancing":[12],"Embedded":[13],"Security":[14,19],"on":[15,36,51,99,113,166],"OS":[17],"Level\".":[18],"essential":[21],"Internet":[24],"of":[25,39,65,103,136,152,162,169,195,216],"Things":[26],"(IoT).":[27],"Cryptographic":[28],"operations":[29],"authentication":[31],"and":[32,42,60,138,186],"encryption":[33],"commonly":[34],"rely":[35],"random":[37,176],"input":[38],"high":[40],"entropy":[41],"secure,":[43],"tamper-resistant":[44],"identities,":[45],"which":[46,109,211],"are":[47],"difficult":[48],"to":[49,86],"obtain":[50],"constrained":[52],"embedded":[53],"devices.":[54,94,219],"In":[55,197],"this":[56],"paper,":[57],"we":[58,202],"design":[59,98],"analyze":[61],"a":[62,148,198],"generic":[63],"integration":[64],"physically":[66],"unclonable":[67],"functions":[68],"(PUFs)":[69],"into":[70],"IoT":[72,117,218],"operating":[73],"system":[74],"RIOT":[75],"that":[76,119,174,204],"supports":[77],"about":[78],"250":[79],"platforms.":[80],"Our":[81,164],"approach":[82],"leverages":[83],"uninitialized":[84],"SRAM":[85,111,128,172,181,205],"act":[87],"as":[88,130,132],"digital":[90],"fingerprint":[91],"heterogeneous":[93],"We":[95,125],"ground":[96],"an":[100],"extensive":[101],"study":[102],"PUF":[104,182],"performance":[105],"in":[106,122,142],"wild,":[108],"involves":[110],"measurements":[112],"more":[114,191],"than":[115,192],"700":[116],"nodes":[118],"aged":[120],"naturally":[121],"real-world.":[124],"quantify":[126],"static":[127],"bias,":[129],"well":[131],"aging":[134],"effects":[135],"devices":[137,168],"incorporate":[139],"results":[141],"system.":[144],"work":[146],"closes":[147],"previously":[149],"identified":[150],"gap":[151],"missing":[153],"statistically":[154],"significant":[155],"sample":[156],"sizes":[157],"testing":[159],"unpredictability":[161],"PUFs.":[163],"experiments":[165],"COTS":[167],"64":[170],"kB":[171],"indicate":[173],"secure":[175],"seeds":[177],"derived":[178],"from":[179],"provide":[183,190],"256":[184],"Bits-,":[185],"device":[187],"unique":[188],"keys":[189],"128":[193],"Bits":[194],"security.":[196],"practical":[199],"security":[200,215],"assessment":[201],"show":[203],"PUFs":[206],"resist":[207],"moderate":[208],"attack":[209],"scenarios,":[210],"greatly":[212],"improves":[213],"low-end":[217]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
