@INPROCEEDINGS{4559056, author={Jiawei Huang and Lach, J.}, booktitle={Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on}, title={IC activation and user authentication for security-sensitive systems}, year={2008}, pages={76-80}, keywords={authorisation;integrated circuits;reverse engineering;IC activation;access key brute-forcing;circuit layout;combat arenas;integrated circuits;malicious attack;protection scheme;remote locations;reverse engineering;security-sensitive systems;signature generation;user authentication;user authentication procedure;Application software;Application specific integrated circuits;Authentication;Costs;Hardware;Humans;Manufacturing;Protection;Reverse engineering;Security;IC activation;PUF;reverse engineering;security-sensitive hardware protection;signature generation;user authentication}, doi={10.1109/HST.2008.4559056},}