ABSTRACT
Small form, mobile, and remote sensor network systems require secure and ultralow power data collection and communication solutions due to their energy constraints. The physical unclonable function (PUF) has emerged as a popular modern low power security primitive. However, current designs are analog in nature and susceptible to instability and difficult to integrate into existing circuitry. In this paper, we present the digital PUF which is stable in the same sense that digital logic is stable, has a very small footprint and very small timing overhead, and can be easily integrated into existing designs. We demonstrate the use of the digital PUF on two applications that are crucial for sensor networks: trusted remote sensing and logic obfuscation. We present our security analysis using standard randomness tests and confusion and diffusion analysis, and apply our new obfuscation approach on a set of standard design benchmarks.
- A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, "A statistical test suite for random and pseudorandom number generators for cryptographic applications," tech. rep., DTIC Document, 2001.Google Scholar
- C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656--715, 1949.Google ScholarCross Ref
- C. Helfmeier, C. Boit, D. Nedospasov, and J.-P. Seifert, "Cloning physically unclonable functions," in HOST, pp. 1--6, 2013.Google Scholar
- J. Valamehr et al., "Inspection resistant memory: architectural support for security from physical examination," in ACM SIGARCH Computer Architecture News, vol. 40, pp. 130--141, 2012. Google ScholarDigital Library
- R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, "Physical one-way functions," Science, vol. 297, no. 5589, pp. 2026--2030, 2002.Google ScholarCross Ref
- B. Gassend et al., "Silicon physical random functions," in Computer and Communications Security, pp. 148--160, 2002. Google ScholarDigital Library
- J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in CHES, pp. 63--80, 2007. Google ScholarDigital Library
- G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in DAC, pp. 9--14, 2007. Google ScholarDigital Library
- J. W. Lee et al., "A technique to build a secret key in integrated circuits for identification and authentication applications," in Symposium on VLSI Circuits, pp. 176--179, 2004.Google Scholar
- S. Devadas et al., "Design and implementation of PUF-based 'unclonable' RFID ICs for anti-counterfeiting and security applications," in IEEE International Conference on RFID, pp. 58--64, 2008.Google Scholar
- E. Simpson and P. Schaumont, "Offline hardware/software authentication for reconfigurable platforms," in CHES, pp. 311--323, 2006. Google ScholarDigital Library
- Y. Alkabani and F. Koushanfar, "Active hardware metering for intellectual property protection and security," in USENIX Security Symposium, pp. 291--306, 2007. Google ScholarDigital Library
- M. Potkonjak, S. Meguerdichian, and J. L. Wong, "Trusted sensors and remote sensing," in IEEE Sensors, pp. 1104--1107, 2010.Google Scholar
- J. B. Wendt and M. Potkonjak, "Nanotechnology-based trusted remote sensing," in IEEE Sensors, pp. 1213--1216, 2011.Google Scholar
- G. E. Suh et al., "Design and implementation of the AEGIS single-chip secure processor using physical random functions," in ACM SIGARCH Computer Architecture News, vol. 33, pp. 25--36, 2005. Google ScholarDigital Library
- N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," in Information Hiding, pp. 206--220, 2009. Google ScholarDigital Library
- U. Rúhrmair, "SIMPL systems, or: can we design cryptographic hardware without secret key information?," in SOFSEM, pp. 26--45, 2011. Google ScholarDigital Library
- T. Xu, J. B. Wendt, and M. Potkonjak, "Digital bimodal function: an ultra-low energy security primitive," in ISLPED, pp. 292--296, 2013. Google ScholarDigital Library
- M. Fyrbiak, C. Kison, and W. Adi, "Construction of software-based digital physical clone resistant functions," in International Conference on Emerging Security Technologies, pp. 109--112, 2013. Google ScholarDigital Library
- M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for design and implementation of secure reconfigurable PUFs," ACM Transactions on Reconfigurable Technology and Systems, vol. 2, no. 1, p. 5, 2009. Google ScholarDigital Library
- U. Rührmair et al., "Modeling attacks on physical unclonable functions," in Computer and Communications Security, pp. 237--249, 2010. Google ScholarDigital Library
- X. Xu and W. Burleson, "Hybrid side-channel/machine-learning attacks on PUFs: a new threat?," in DATE, p. 349, 2014. Google ScholarDigital Library
- D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi, "The EM side-channel(s)," in CHES, pp. 29--45, 2003. Google ScholarDigital Library
- S. P. Skorobogatov and R. J. Anderson, "Optical fault induction attacks," in CHES, pp. 2--12, 2003. Google ScholarDigital Library
- J. A. Halderman et al., "Lest we remember: cold-boot attacks on encryption keys," Communications of the ACM, vol. 52, no. 5, pp. 91--98, 2009. Google ScholarDigital Library
- Y. Ren, Y. Shi, and B.-H. Gwee, "A novel gate-level to behavior-level conversion algorithm with high microcell identification rate," in IASTED International Conference, vol. 712, p. 138, 2010.Google Scholar
- J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, "Security analysis of logic obfuscation," in DAC, pp. 83--89, 2012. Google ScholarDigital Library
- J. Zheng and M. Potkonjak, "DPUF: A reconfigurable IP protection architecture for embedded systems," in ANCS, pp. 1--2, 2014.Google Scholar
- W. Huang et al., "Hotspot: A compact thermal modeling methodology for early-stage VLSI design," IEEE Transactions on Very Large Scale Integration Systems, vol. 14, no. 5, pp. 501--513, 2006. Google ScholarDigital Library
- "Implementation of security in Actel's ProASIC and ProASICPLUS flash-based FPGAs." http://www.actel.com/documents/Flash_Security_AN.pdf, 2003.Google Scholar
- D. H. Kim, K. Athikulwongse, and S. K. Lim, "A study of through-silicon-via impact on the 3D stacked IC layout," in ICCAD, pp. 674--680, 2009. Google ScholarDigital Library
- T. Huffmire et al., "Hardware trust implications of 3-D integration," in Proceedings of the 5th Workshop on Embedded Systems Security, p. 1, 2010. Google ScholarDigital Library
- J. Valamehr et al., "A qualitative security analysis of a new class of 3-D integrated crypto co-processors," in Cryptography and Security: From Theory to Applications, pp. 364--382, 2012. Google ScholarDigital Library
- S. Briais et al., "3D hardware canaries," in CHES, pp. 1--22, 2012. Google ScholarDigital Library
- U. Guvenc, "Active shield with electrically configurable interconnections," in SECUREWARE, pp. 43--45, 2013.Google Scholar
- F. Brglez, D. Bryan, and K. Kozminski, "Combinational profiles of sequential benchmark circuits," in ISCAS, pp. 1929--1934, 1989.Google Scholar
Index Terms
- Secure remote sensing and communication using digital pufs
Recommendations
Hierarchical Label Propagation and Discovery for Machine Generated Email
WSDM '16: Proceedings of the Ninth ACM International Conference on Web Search and Data MiningMachine-generated documents such as email or dynamic web pages are single instantiations of a pre-defined structural template. As such, they can be viewed as a hierarchy of template and document specific content. This hierarchical template ...
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels
DAC '14: Proceedings of the 51st Annual Design Automation ConferenceThis paper investigates and addresses the vulnerabilities of existing physical unclonable functions (PUFs). We first develop a PUF reverse engineering approach by conducting gate-level characterization (GLC). Based on the gate-level delay properties, we ...
Template Induction over Unstructured Email Corpora
WWW '17: Proceedings of the 26th International Conference on World Wide WebUnsupervised template induction over email data is a central component in applications such as information extraction, document classification, and auto-reply. The benefits of automatically generating such templates are known for structured data, e.g. ...
Comments