System-of-PUFs: Multilevel Security for Embedded Systems

被引:5
|
作者
Konigsmark, S. T. Choden [1 ]
Hwang, Leslie K. [1 ]
Chen, Deming [1 ]
Wong, Martin D. F. [1 ]
机构
[1] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL 61820 USA
来源
2014 INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN AND SYSTEM SYNTHESIS (CODES+ISSS) | 2014年
关键词
Physically Unclonable Functions; Hardware Authentication;
D O I
10.1145/2656075.2656099
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded systems continue to provide the core for a wide range of applications, from smart-cards for mobile payment to smart-meters for power-grids. The resource and power dependency of embedded systems continues to be a challenge for state-of-the-art security practices. Moreover, even theoretically secure algorithms are often vulnerable in their implementation. With decreasing cost and complexity, physical attacks are an increasingly important threat. This threat led to the development of Physically Unclonable Functions (PUFs) which are disordered physical systems with various applications in hardware security. However, consistent security oriented design of embedded systems remains a challenge, as most formalizations and security models are concerned with isolated physical components or high-level concept. We provide four unique contributions: (i) We propose a system-level security model to overcome the chasm between secure components and requirements of high-level protocols; this enables synergy between component-oriented security formalizations and theoretically proven protocols. (ii) An analysis of current practices in PUF protocols using the proposed system-level security model; we identify significant issues and expose assumptions that require costly security techniques. (iii) A System-of-PUF (SoP) that utilizes the large PUF design-space to achieve security requirements with minimal resource utilization; SoP requires 64% less gate-equivalent units than recently published schemes. (iv) A multilevel authentication protocol based on SoP which is validated using our system-level security model and which overcomes current vulnerabilities. Furthermore, this protocol offers breach recognition and recovery.
引用
收藏
页数:10
相关论文
共 6 条
  • [1] Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs
    Wisiol, Nils
    Margraf, Marian
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (03) : 221 - 230
  • [2] Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs
    Nils Wisiol
    Marian Margraf
    Journal of Cryptographic Engineering, 2019, 9 : 221 - 230
  • [3] Fresh Re-Keying with Strong PUFs: a New Approach to Side-Channel Security
    Xi, Xiaodan
    Aysu, Aydin
    Orshansky, Michael
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 118 - 125
  • [4] PUF for the Commons: Enhancing Embedded Security on the OS Level
    Kietzmann, Peter
    Schmidt, Thomas C.
    Wahlisch, Matthias
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2194 - 2210
  • [5] A Novel PUF-Based Encryption Protocol for Embedded System On Chip
    Stanciu, Alexandra
    Moldoveanu, Florin Dumitru
    Cirstea, Marcian
    2016 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENT AND APPLICATION SYSTEMS (DAS 2016), 2016, : 158 - 165
  • [6] ASSURE: A Hardware-Based Security Protocol for Resource-Constrained IoT Systems
    Yildiran Yilmaz
    Leonardo Aniello
    Basel Halak
    Journal of Hardware and Systems Security, 2021, 5 (1) : 1 - 18