Techniques for Design and Implementation of Secure Reconfigurable PUFs

被引:140
作者
Majzoobi, Mehrdad [1 ]
Koushanfar, Farinaz [1 ]
Potkonjak, Miodrag [2 ]
机构
[1] Rice Univ, Dept Elect & Comp Engn, Houston, TX 77005 USA
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
关键词
Design; Security; Reliability; Reconfigurable systems; physically unclonable functions; hardware security; process variation; IDENTIFICATION; AUTHENTICATION;
D O I
10.1145/1502781.1502786
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physically unclonable functions (PUFs) provide a basis for many security and digital rights management protocols. PUF-based security approaches have numerous comparative strengths with respect to traditional cryptography-based techniques, including resilience against physical and side channel attacks and suitability for lightweight protocols. However, classical delay-based PUF structures have a number of drawbacks including susceptibility to guessing, reverse engineering, and emulation attacks, as well as sensitivity to operational and environmental variations. To address these limitations, we have developed a new set of techniques for FPGA-based PUF design and implementation. We demonstrate how reconfigurability can be exploited to eliminate the stated PUF limitations. We also show how FPGA-based PUFs can be used for privacy protection. Furthermore, reconfigurability enables the introduction of new techniques for PUF testing. The effectiveness of all the proposed techniques is validated using extensive implementations, simulations, and statistical analysis.
引用
收藏
页数:33
相关论文
共 48 条
[41]  
Shamsi D., 2008, 2008 ACM/IEEE International Symposium on Low Power Electronics and Design - ISLPED, P341, DOI 10.1145/1393921.1394011
[42]  
Su Y., 2007, INT SOLID STATE CIRC, P606
[43]   Physical unclonable functions for device authentication and secret key generation [J].
Suh, G. Edward ;
Devadas, Srinivas .
2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, :9-+
[44]   A provably secure true random number generator with built-in tolerance to active attacks [J].
Sunar, Berk ;
Martin, William J. ;
Stinson, Douglas R. .
IEEE TRANSACTIONS ON COMPUTERS, 2007, 56 (01) :109-119
[45]   Trusted design in FPGAs [J].
Trimberger, Steve .
2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, :5-8
[46]  
Tuyls P, 2006, LECT NOTES COMPUT SC, V4249, P369
[47]  
WOLLINGER T., 2004, ACM T EMBED COMPUT, V3
[48]  
Wong JSJ, 2007, ICFPT 2007: INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, P17