[1] Bucci M, Germani L, Luzzi R, et al. A high-speed oscillator-based truly random number source for cryptographic applications on a smart card IC[J]. Computers, IEEE Transactions on, 2003, 52(4):403-409.[2] Lee B, Son K, Won D, et al. Secure data deletion for USB flash memory[J]. J Inf Sci Eng, 2011, 27(3):933-952.[3] Reardon J, Capkun S, Basin D A. Data node encrypted file system:Efficient secure deletion for flash memory[C]//USENIX Security Symposium. 2012:333-348.[4] Wang Y, Yu W, Xu S Q, et al. Hiding information in flash memory[C]//Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013:271-285.[5] Prabhu P, Akel A, Grupp L M, et al. Extracting device fingerprints from flash memory by exploiting physical variations[C]//Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2011:188-201.[6] Wang Y, Yu W, Wu S, et al. Flash memory for ubiquitous hardware security functions:true random number generation and device fingerprints[C]//Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 2012:33-47.[7] Gal E, Toledo S. Algorithms and data structures for flash memories[J]. ACM Computing Surveys (CSUR), 2005, 37(2):138-163.[8] Suh G E, Devadas S. Physical unclonable functions for device authentication and secret key generation[C]//Proceedings of the 44th annual Design Automation Conference. ACM, 2007:9-14.[9] Lee J W, Lim D, Gassend B, et al. A technique to build a secret key in integrated circuits for identification and authentication applications[C]//VLSI Circuits, 2004. Digest of Technical Papers, 2004 Symposium on. IEEE, 2004:176-179. |