ABSTRACT
In this work, we present probability based response generation schemes for MUX based Physical Unclonable Functions (PUFs). Compared to previous implementations where temporal majority voting (TMV) based on limited samples and coarse criteria was utilized to determine final responses, our design can collect soft responses with detailed probability information using simple on-chip circuits. Thresholds with fine accuracy are applied to efficiently distinguish stable and unstable challenge response pairs (CRPs). A 32nm test chip including both linear and feed-forward MUX PUFs was implemented for concept verification. Based on a detailed analysis of the hardware data, we propose several enhanced thresholding strategies for determining stable CRPs. For instance, a stringent threshold can be imposed in enrollment phase for selecting good CRPs, while a relaxed threshold can be used during normal authentication phase. Experimental data shows a high degree of uniqueness and randomness in the PUF responses which can be attributed to the carefully optimized circuit layout. Finally, output characteristic of a feed-forward MUX PUF was compared to that of a standard linear MUX PUF from the same 32nm chip.
- Herder, C., Yu, M., Koushanfar, F., and Devadas, S. 2014. Physical Unclonable Functions and Applications: A Tutorial. Proceedings of the IEEE, 1126--1141.Google Scholar
- Bohm, C. and Hofer, M. 2013. Physical Unclonable Functions in Theory and Practice. Springer, 57--68, 87.Google Scholar
- Yang, K., Dong, Q., Blaauw, D., and Sylvester, D. 2015. A physically unclonable function with BER <10-8 for robust chip authentication using oscillator collapse in 40nm CMOS. International IEEE Solid-State Circuits Conference, 1--3.Google Scholar
- Mathew, S. K., Satpathy, S. K., Anders, M. A., et al. 2014. A 0.19pJ/b PVT-variation-tolerant hybrid physically unclonable function circuit for 100% stable secure key generation in 22nm CMOS. In IEEE International Solid-State Circuits Conference, 278--279.Google ScholarCross Ref
- Alvarez, A., Zhao, W., Alioto, M. 2015. 15fJ/b static physically unclonable functions for secure chip identification with <2% native bit instability and 140x Inter/Intra PUF hamming distance separation in 65nm. In IEEE International Solid State Circuits Conference, 1--3.Google Scholar
- Armknecht, F., Maes, R., Sadeghi, A., Sunar, B., and Tuyls, P. 2009. Memory leakage-resilient encryption based on physically unclonable functions. Springer, 685--702. Google ScholarDigital Library
- Lee, J. W., Lim, D., Gassend, B., et al. 2004. A technique to build a secret key in integrated circuits for identification and authentication applications. Symposium on VLSI Circuits, 176--179.Google ScholarCross Ref
- Rührmair, U., Sehnke, F., Sölter, J., et al. 2010. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security, 237--249. Google ScholarDigital Library
- Delvaux, J. and Verbauwhede, I. 2013. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. IEEE International Symposium on Hardware-Oriented Security and Trust, 137--142.Google Scholar
- Pedregosa, F., Varoquaux, G., Gramfort, A., et al. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research, 2825--2830. Google ScholarDigital Library
- Lao, Y., Parhi, K. K., 2014. Statistical Analysis of MUX-Based Physical Unclonable Functions. in Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions, 649--662.Google Scholar
Index Terms
- Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs
Recommendations
Feed-Forward XOR PUFs: Reliability and Attack-Resistance Analysis
GLSVLSI '19: Proceedings of the 2019 on Great Lakes Symposium on VLSIPhysical unclonable functions (PUFs) can be used to generate unique signatures of integrated circuit (IC) chips. XOR arbiter PUFs (XOR PUFs), that typically contain multiple standard arbiter PUFs as their components, are more secure than standard ...
On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
RFIDsec 2015: Revised Selected Papers of the 11th International Workshop on Radio Frequency Identification - Volume 9440Physical Unclonable Functions PUFs are seen as a promising alternative to traditional cryptographic algorithms for secure and lightweight device authentication. However, most strong PUF proposals can be attacked using machine learning algorithms in ...
Eyelid and eyelash detection method in the normalized iris image using the parabolic Hough model and Otsu's thresholding method
Eyelids and eyelashes occluding the iris region are noise factors that degrade the performance of iris recognition. If they are incorrectly classified as an iris region, the false iris region information decreases the recognition rate. Thus, reliable ...
Comments