Techniques for Design and Implementation of Secure Reconfigurable PUFs

被引:140
作者
Majzoobi, Mehrdad [1 ]
Koushanfar, Farinaz [1 ]
Potkonjak, Miodrag [2 ]
机构
[1] Rice Univ, Dept Elect & Comp Engn, Houston, TX 77005 USA
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
关键词
Design; Security; Reliability; Reconfigurable systems; physically unclonable functions; hardware security; process variation; IDENTIFICATION; AUTHENTICATION;
D O I
10.1145/1502781.1502786
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physically unclonable functions (PUFs) provide a basis for many security and digital rights management protocols. PUF-based security approaches have numerous comparative strengths with respect to traditional cryptography-based techniques, including resilience against physical and side channel attacks and suitability for lightweight protocols. However, classical delay-based PUF structures have a number of drawbacks including susceptibility to guessing, reverse engineering, and emulation attacks, as well as sensitivity to operational and environmental variations. To address these limitations, we have developed a new set of techniques for FPGA-based PUF design and implementation. We demonstrate how reconfigurability can be exploited to eliminate the stated PUF limitations. We also show how FPGA-based PUFs can be used for privacy protection. Furthermore, reconfigurability enables the introduction of new techniques for PUF testing. The effectiveness of all the proposed techniques is validated using extensive implementations, simulations, and statistical analysis.
引用
收藏
页数:33
相关论文
共 48 条
[1]  
Alkabani Y., 2007, Inproceedings of 16th USENIX security symposium on USENIX security symposium, P1
[2]  
ALKABANI Y. M., 2008, P C INF HID
[3]  
Alkabani Y, 2008, DES AUT CON, P606
[4]  
Alkabani Y, 2007, IEEE IC CAD, P674
[5]  
[Anonymous], 2001, Security Engineering: A Guide to Building Dependable Distributed Systems
[6]   Random dopant induced threshold voltage lowering and fluctuations in sub-0.1 μm MOSFET's:: A 3-D "atomistic" simulation study [J].
Asenov, A .
IEEE TRANSACTIONS ON ELECTRON DEVICES, 1998, 45 (12) :2505-2513
[7]   High-performance CMOS variability in the 65-nm regime and beyond [J].
Bernstein, K. ;
Frank, D. J. ;
Gattiker, A. E. ;
Haensch, W. ;
Ji, B. L. ;
Nassif, S. R. ;
Nowak, E. J. ;
Pearson, D. J. ;
Rohrer, N. J. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2006, 50 (4-5) :433-449
[8]   Physically unclonable function-based security and privacy in RFID systems [J].
Bolotnyy, Leonid ;
Robins, Gabriel .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, :211-+
[9]  
Brizek J., 2005, WORKSHOP SCALABLE TR, P19
[10]  
Corman T.H., 2001, INTRO ALGORITHMS, V2nd