Hardware signature generation using a hybrid PUF and FSM model for an SOC architecture

被引:0
作者
Kokila J. [1 ]
Das A.M. [1 ]
Begum B.S. [1 ]
Ramasubramanian N. [1 ]
机构
[1] Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, 620015, Tamil Nadu
来源
Periodica polytechnica Electrical engineering and computer science | 2019年 / 63卷 / 04期
关键词
Finite State Machine (FSM); Intellectual Property (IP); Physical Unclonable Function (PUF); System on Chip (SoC); Zedboard;
D O I
10.3311/PPee.13424
中图分类号
学科分类号
摘要
Security is becoming an important issue in the recent System on Chip (SoC) design due to various hardware attacks that can affect manufacturers, system designers or end users. Major issues include hardware Trojan attack, hardware intellectual property (IP) theft, such as an illegal sale or use of firm intellectual property cores or integrated circuits (ICs) and physical attacks. A hybrid model consisting of Arbiter PUF and Butterfly PUF are used to generate random responses which are fed to a Finite State Machine (FSM). A three-level FSM was designed to generate the signature correctly to authenticate IPs. The results were obtained with the help of three Intellectual Property (IP) cores – Zedboard OLED IP, ISCAS’89 s1423 Benchmark IP and a Full Adder IP. A 16-bit arbiter PUF and Butterfly PUF have been implemented on a 28nm FPGA. The average execution time to generate hardware signature for three IP cores was found to be 4.78 seconds (5 iterations) which is considerably low. © 2019 Budapest University of Technology and Economics. All rights reserved.
引用
收藏
页码:244 / 253
页数:9
相关论文
共 21 条
[1]  
Guajardo J., Kumar S.S., Schrijen G.-J., Tuyls P., FPGA intrinsic PUFs and their use for IP protection, Cryptographic Hardware Embedded Systems, pp. 63-80, (2007)
[2]  
Guajardo J., Kumar S.S., Schrijen G.-J., Tuyls P., Physical unclonable functions and public-key crypto for FPGA IP protection, International Conference on Field Programmable Logic and Applications, pp. 189-195, (2007)
[3]  
Trimberger S.M., Moore J.J., FPGA security: Motivations, features, and applications, Proceedings of the IEEE, 102, 8, pp. 1248-1265, (2014)
[4]  
Zhang J., Lin Y., Lyu Y., Qu G., Cheung R.C.C., Che W., Zhou Q., Bian J., FPGA IP protection by binding finite state machine to physical unclonable function, 23rd International Conference on Field Programmable Logic and Applications, pp. 1-4, (2013)
[5]  
Herder C., Yu M.-D., Koushanfar F., Devadas S., Physical unclonable functions and applications: A tutorial, Proceedings of the IEEE, 102, 8, pp. 1126-1141, (2014)
[6]  
Tuyls P., Skoric B., Strong authentication with PUFs, Security, Privacy and Trust in ModernDataManagement,Data-CentricSystemsandApplications, pp. 133-148, (2007)
[7]  
Paral Z., Devadas S., Reliable and efficient PUF-based key generation using pattern matching, IEEE International Symposium on Hardware-Oriented Security Trust San Diego, pp. 128-133, (2011)
[8]  
Devadas S., Yu M.D., Secure and robust error correction for physical unclonable functions, IEEE Design and Test of Computers, 27, 1, pp. 48-65, (2010)
[9]  
Maes R., Verbauwhede I., Physically unclonable functions: A study on the state of the art and future research directions, Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 3-37, (2010)
[10]  
Dailey M.D., Authentication Schemes Based on Physically Unclonable Functions, (2009)