Physical unclonable functions

被引:318
作者
Gao, Yansong [1 ,2 ]
Al-Sarawi, Said F. [3 ]
Abbott, Derek [4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] CSIRO, Data61, Sydney, NSW, Australia
[3] Univ Adelaide, Ctr Biomed Engn, Sch Elect & Elect Engn, Adelaide, SA, Australia
[4] Univ Adelaide, Sch Elect & Elect Engn, Adelaide, SA, Australia
基金
中国国家自然科学基金;
关键词
LOW-POWER; PUF; HARDWARE; ATTACKS; ARBITER; MEMORY; SECURE; RELIABILITY; GENERATION; EXTRACTOR;
D O I
10.1038/s41928-020-0372-5
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A physical unclonable function (PUF) is a device that exploits inherent randomness introduced during manufacturing to give a physical entity a unique 'fingerprint' or trust anchor. These devices are .of potential use in a variety of applications from anti-counterfeiting, identification, authentication and key generation to advanced protocols such as oblivious transfer, key exchange, key renovation and virtual proof of reality. Here we review the development of PUFs, including those that exploit optical, circuit time-delay and volatile/non-volatile memory characteristics. We examine the various applications of PUFs, and consider the security issues that they must confront, highlighting known attacks to date and potential countermeasures. We also consider the key areas for future development such as bit-specific reliability, reconfigurability and public key infrastructure. This Review Article examines the development of physical unclonable functions, which exploit inherent randomness to give a physical entity a unique 'fingerprint' or trust anchor, considering the various potential applications of these devices and the security issues that they must confront.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 146 条
  • [1] Alioto M., PHYS UNCLONABLE FUNC
  • [2] Initial tamper tests of novel tamper-indicating optical physical unclonable functions
    Anderson, Benjamin R.
    Gunawidjaja, Ray
    Eilers, Hergen
    [J]. APPLIED OPTICS, 2017, 56 (10) : 2863 - 2872
  • [3] [Anonymous], 2004, THESIS
  • [4] [Anonymous], PUF DAT
  • [5] [Anonymous], 2016, IEEE ASIANHOST
  • [6] Feed-Forward XOR PUFs: Reliability and Attack-Resistance Analysis
    Avvaru, S. V. Sandeep
    Parhi, Keshab K.
    [J]. GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, 2019, : 287 - 290
  • [7] Aysu A, 2017, 2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P134, DOI 10.1109/HST.2017.7951812
  • [8] Becker G. T., 2014, IACR Cryptology ePrint Archive, P287
  • [9] Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice
    Becker, Georg T.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (05) : 783 - 795
  • [10] The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
    Becker, Georg T.
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 535 - 555