skip to main content
10.1145/2934583.2934613acmconferencesArticle/Chapter ViewAbstractPublication PagesislpedConference Proceedingsconference-collections
research-article
Best Paper

Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs

Authors Info & Claims
Published:08 August 2016Publication History

ABSTRACT

In this work, we present probability based response generation schemes for MUX based Physical Unclonable Functions (PUFs). Compared to previous implementations where temporal majority voting (TMV) based on limited samples and coarse criteria was utilized to determine final responses, our design can collect soft responses with detailed probability information using simple on-chip circuits. Thresholds with fine accuracy are applied to efficiently distinguish stable and unstable challenge response pairs (CRPs). A 32nm test chip including both linear and feed-forward MUX PUFs was implemented for concept verification. Based on a detailed analysis of the hardware data, we propose several enhanced thresholding strategies for determining stable CRPs. For instance, a stringent threshold can be imposed in enrollment phase for selecting good CRPs, while a relaxed threshold can be used during normal authentication phase. Experimental data shows a high degree of uniqueness and randomness in the PUF responses which can be attributed to the carefully optimized circuit layout. Finally, output characteristic of a feed-forward MUX PUF was compared to that of a standard linear MUX PUF from the same 32nm chip.

References

  1. Herder, C., Yu, M., Koushanfar, F., and Devadas, S. 2014. Physical Unclonable Functions and Applications: A Tutorial. Proceedings of the IEEE, 1126--1141.Google ScholarGoogle Scholar
  2. Bohm, C. and Hofer, M. 2013. Physical Unclonable Functions in Theory and Practice. Springer, 57--68, 87.Google ScholarGoogle Scholar
  3. Yang, K., Dong, Q., Blaauw, D., and Sylvester, D. 2015. A physically unclonable function with BER <10-8 for robust chip authentication using oscillator collapse in 40nm CMOS. International IEEE Solid-State Circuits Conference, 1--3.Google ScholarGoogle Scholar
  4. Mathew, S. K., Satpathy, S. K., Anders, M. A., et al. 2014. A 0.19pJ/b PVT-variation-tolerant hybrid physically unclonable function circuit for 100% stable secure key generation in 22nm CMOS. In IEEE International Solid-State Circuits Conference, 278--279.Google ScholarGoogle ScholarCross RefCross Ref
  5. Alvarez, A., Zhao, W., Alioto, M. 2015. 15fJ/b static physically unclonable functions for secure chip identification with <2% native bit instability and 140x Inter/Intra PUF hamming distance separation in 65nm. In IEEE International Solid State Circuits Conference, 1--3.Google ScholarGoogle Scholar
  6. Armknecht, F., Maes, R., Sadeghi, A., Sunar, B., and Tuyls, P. 2009. Memory leakage-resilient encryption based on physically unclonable functions. Springer, 685--702. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lee, J. W., Lim, D., Gassend, B., et al. 2004. A technique to build a secret key in integrated circuits for identification and authentication applications. Symposium on VLSI Circuits, 176--179.Google ScholarGoogle ScholarCross RefCross Ref
  8. Rührmair, U., Sehnke, F., Sölter, J., et al. 2010. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security, 237--249. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Delvaux, J. and Verbauwhede, I. 2013. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. IEEE International Symposium on Hardware-Oriented Security and Trust, 137--142.Google ScholarGoogle Scholar
  10. Pedregosa, F., Varoquaux, G., Gramfort, A., et al. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research, 2825--2830. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lao, Y., Parhi, K. K., 2014. Statistical Analysis of MUX-Based Physical Unclonable Functions. in Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions, 649--662.Google ScholarGoogle Scholar

Index Terms

  1. Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ISLPED '16: Proceedings of the 2016 International Symposium on Low Power Electronics and Design
            August 2016
            392 pages
            ISBN:9781450341851
            DOI:10.1145/2934583

            Copyright © 2016 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 August 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            ISLPED '16 Paper Acceptance Rate60of190submissions,32%Overall Acceptance Rate398of1,159submissions,34%

            Upcoming Conference

            ISLPED '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader