Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

被引:0
|
作者
Kareem, Husam [1 ]
Dunaev, Dmitriy [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Automat & Appl Informat, Budapest, Hungary
关键词
physical unclonable functions; obfuscation; hardware obfuscation; hardware security; IC piracy; IP piracy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A clear majority of electronic devices applications used in our daily life require a reliable, secure architecture, e.g., healthcare, social security cards, electronic meters, and smart homes. As a result, many studies are trying to develop appropriate solutions to tackle hardware security threats such as IC piracy, IC overbuilding, reverse engineering, counterfeiting, and tampering. Hardware obfuscation has been introduced as one of the leading robust, low-cost security solutions against different security threats, especially when combined with physical unclonable functions. Considering the inherent irreproducibility of PUFs, this method can provide a high-level security system. However, finding an applicable existent PUF or implementing a new PUF design that meets each hardware obfuscation requirements is not a trivial task. This study reviews and discusses hardware security systems based on PUFs inherited variations and the corresponding hardware obfuscation approaches.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] PUFSec: Protecting Physical Unclonable Functions Using Hardware Isolation-based System Security Techniques
    Ye, Mengmei
    Shahrak, Mehrdad Zaker
    Wei, Sheng
    PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2017, : 7 - 12
  • [2] Hardware trojan side-channels based on physical unclonable functions
    Gong, Zheng
    Makkes, Marc X.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6633 : 294 - 303
  • [3] Hardware Trojan Side-Channels Based on Physical Unclonable Functions
    Gong, Zheng
    Makkes, Marc X.
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 294 - 303
  • [4] OPUF: Obfuscation Logic Based Physical Unclonable Function
    Ye, Jing
    Hu, Yu
    Li, Xiaowei
    2015 IEEE 21ST INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2015, : 156 - 161
  • [5] Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges
    Babaei, Armin
    Schiele, Gregor
    SENSORS, 2019, 19 (14)
  • [6] Hardware assurance with silicon photonic physical unclonable functions
    Mahdian, Mohammad Amin
    Taheri, Ebadollah
    Rahbardar Mojaver, Kaveh
    Nikdast, Mahdi
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [7] An SR Flip-Flop based Physical Unclonable Functions for Hardware Security
    Challa, Rohith Prasad
    Islam, Sheikh Ariful
    Katkoori, Srinivas
    2019 IEEE 62ND INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2019, : 574 - 577
  • [8] A Hardware Security Architecture : PUFs(Physical Unclonable Functions) using memristor
    Sun, Wookyung
    Lee, Jungwon
    Kim, Dayoung
    Choi, Yunyeong
    2021 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2021,
  • [9] Physical unclonable functions
    Yansong Gao
    Said F. Al-Sarawi
    Derek Abbott
    Nature Electronics, 2020, 3 : 81 - 91
  • [10] Oblivious Transfer Based on Physical Unclonable Functions
    Ruhrmair, Ulrich
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 430 - 440