Obtaining Statistically Random Information From Silicon Physical Unclonable Functions

被引:10
作者
Yin, Chi-En [1 ]
Qu, Gang [1 ]
机构
[1] Univ Maryland, Syst Res Inst, Dept Elect & Comp Engn, College Pk, MD 20742 USA
基金
美国国家科学基金会;
关键词
Ring oscillator (RO); physical unclonable functions (PUFs); linear regression; variation decomposition; IMPLEMENTATION;
D O I
10.1109/TETC.2014.2316497
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Silicon physical unclonable functions (PUFs) utilize the variation during silicon fabrication process to extract information that will be unique for each chip. There have been many recent approaches to how PUF can be used to improve security-related applications. However, it is well known that the fabrication variation has very strong spatial correlation(1) and this has been pointed out as a security threat to silicon PUF. In fact, when we apply NIST's statistical test suite for randomness against the random sequences generated from a population of 125 ring oscillator PUFs using classic 1-out-of-8 coding and neighbor coding, none of them can pass all the tests. In this paper, we propose to decouple the unwanted systematic variation from the desired random variation through a regression-based distiller, where the basic idea is to build a model for the systematic variation so we can generate the random sequences only from the true random variation. Applying neighbor coding to the same benchmark data, our experiment shows that second-and third-order polynomials distill random sequences that pass all the NIST randomness tests. So does fourth-order polynomial in the case of 1-out-of-8 coding. Finally, we introduce two generic random sequence generation methods. The sequences they generate fail all the randomness tests, but with the help of our proposed polynomial distiller, all but one tests are passed. These results demonstrate that our method can provide statistically random PUF information and thus bolster the security characteristics of existing PUF schemes.
引用
收藏
页码:96 / 106
页数:11
相关论文
共 38 条
[1]  
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[2]  
[Anonymous], 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P100, DOI 10.1109/HST.2010.5513105
[3]  
[Anonymous], 2001, THESIS CAMBRIDGE
[4]  
[Anonymous], 2001, Security Engineering: A Guide to Building Dependable Distributed Systems
[5]  
[Anonymous], 1997, INT WORKSH SEC PROT
[6]  
[Anonymous], 2010, Technical Report
[7]  
[Anonymous], 2013, P 50 ANN DESIGN AUTO
[8]  
[Anonymous], LECT NOTES COMPUTER
[9]  
[Anonymous], 2010, P 35 ANN GOMACTECH C
[10]   High-performance CMOS variability in the 65-nm regime and beyond [J].
Bernstein, K. ;
Frank, D. J. ;
Gattiker, A. E. ;
Haensch, W. ;
Ji, B. L. ;
Nassif, S. R. ;
Nowak, E. J. ;
Pearson, D. J. ;
Rohrer, N. J. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2006, 50 (4-5) :433-449