Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art

被引:0
作者
Kareem, Husam [1 ]
Dunaev, Dmitriy [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Automat & Appl Informat, Budapest, Hungary
来源
PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021) | 2021年
关键词
physical unclonable functions; obfuscation; hardware obfuscation; hardware security; IC piracy; IP piracy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A clear majority of electronic devices applications used in our daily life require a reliable, secure architecture, e.g., healthcare, social security cards, electronic meters, and smart homes. As a result, many studies are trying to develop appropriate solutions to tackle hardware security threats such as IC piracy, IC overbuilding, reverse engineering, counterfeiting, and tampering. Hardware obfuscation has been introduced as one of the leading robust, low-cost security solutions against different security threats, especially when combined with physical unclonable functions. Considering the inherent irreproducibility of PUFs, this method can provide a high-level security system. However, finding an applicable existent PUF or implementing a new PUF design that meets each hardware obfuscation requirements is not a trivial task. This study reviews and discusses hardware security systems based on PUFs inherited variations and the corresponding hardware obfuscation approaches.
引用
收藏
页数:6
相关论文
共 28 条
[1]  
Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
[2]  
Alkatheiri MS, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P174, DOI 10.1109/DESEC.2017.8073844
[3]  
[Anonymous], COUNT IMP STUD PRESS
[4]   Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges [J].
Babaei, Armin ;
Schiele, Gregor .
SENSORS, 2019, 19 (14)
[5]   HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection [J].
Chakraborty, Rajat Subhra ;
Bhunia, Swarup .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2009, 28 (10) :1493-1502
[6]  
Forte D., 2017, HARDWARE OBFUSCATION
[7]  
Forte Domenic, 2017, Hardware Protection through Obfuscation, DOI [10.1007/978-3-319-49019-9, DOI 10.1007/978-3-319-49019-9]
[8]   Investigation of Obfuscation-based Anti-Reverse Engineering for Printed Circuit Boards [J].
Guo, Z. ;
Tehranipoor, M. ;
Forte, D. ;
Di, J. .
2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
[9]  
Hazari NA, 2018, PROC NAECON IEEE NAT, P105, DOI 10.1109/NAECON.2018.8556746
[10]   Physical Unclonable Functions and Applications: A Tutorial [J].
Herder, Charles ;
Yu, Meng-Day ;
Koushanfar, Farinaz ;
Devadas, Srinivas .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1126-1141