Abstract
Many security challenges have emerged from what is defined as Internet of Things (IoT), due to the inherent permanent connection of devices involved in networks. Furthermore, IoT devices are often deployed in unattended working environment and, hence, they are prone to physical attacks. Attackers take advantages of such weaknesses to clone devices, tamper the software installed on them and extract cryptographic keys. In this paper, we propose a technique to exploit Static Random Access Memory based Phisical Unclonable Functions to have available a chain-oftrust on a microcontroller device. We prove its effectiveness in terms of reliability and required overhead by introducing a case study based on the STM32F7 device running the Linux operating system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Amato, F., Barbareschi, M., Casola, V., Mazzeo, A.: An fpga-based smart classifier for decision support systems. In: Intelligent Distributed Computing VII, pp. 289–299. Springer (2014)
Amato, F., De Pietro, G., Esposito, M., Mazzocca, N.: An integrated framework for securing semi-structured health records. Knowledge-Based Systems 79, 99–117 (2015)
Amato, F., Moscato, F.: A model driven approach to data privacy verification in e-health systems. Transactions on Data Privacy 8(3), 273–296 (2015)
Amelino, D., Barbareschi, M., Battista, E., Mazzeo, A.: How to manage keys and reconfiguration in wsns exploiting sram based pufs. In: Intelligent Interactive Multimedia Systems and Services 2016, pp. 109–119. Springer (2016)
Bajikar, S.: Trusted platform module (tpm) based security on notebook pcs-white paper. Mobile Platforms Group Intel Corporation pp. 1–20 (2002)
Barbareschi, M., Battista, E., Mazzeo, A., Mazzocca, N.: Testing 90 nm microcontroller sram puf quality. In: Design & Technology of Integrated Systems In Nanoscale Era (DTIS). pp. 1–6. 2015 10th IEEE International Conference On. IEEE (2015)
Barbareschi, M., Battista, E., Mazzeo, A., Venkatesan, S.: Advancing wsn physical security adopting tpm-based architectures. In: Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on. pp. 394–399. IEEE (2014)
Barbareschi, M., Cilardo, A., Mazzeo, A.: Partial fpga bitstream encryption enabling hardware drm in mobile environments. In: Proceedings of the ACM International Conference on Computing Frontiers. pp. 443–448. ACM (2016)
Barbareschi, M., Di Natale, G., Torres, L.: Ring oscillators analysis for security purposes in spartan-6 fpgas. Microprocessors and Microsystems (2016)
Barker, E., Kelsey, J.: Nist special publication 800-90a: Recommendation for random number generation using deterministic random bit generators (2012)
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference. p. 175. ACM (2015)
Cilardo, A.: New techniques and tools for application-dependent testing of FPGA-based components. IEEE Transactions on Industrial Informatics 11(1), 94–103 (2015)
Cilardo, A., Fusella, E., Gallo, L., Mazzeo, A.: Exploiting concurrency for the automated synthesis of MPSoC interconnects. ACM Transactions on Embedded Computing Systems 14(3) (2015)
Cilardo, A., Mazzeo, A., Romano, L., Saggese, G.: An FPGA-based key-store for improving the dependability of security services. pp. 389–396 (2005)
Cilardo, A., Barbareschi, M., Mazzeo, A.: Secure distribution infrastructure for hardware digitalcontents. IET Computers & Digital Techniques 8(6), 300–310 (2014)
Claes, M., van der Leest, V., Braeken, A.: Comparison of sram and ff puf in 65 nm technology. In: Nordic Conference on Secure IT Systems. pp. 47–64. Springer (2011)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International Conference on the Theory and Applications of Cryptographic Techniques. pp. 523–540. Springer (2004)
Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM conference on Computer and communications security. pp. 148–160. ACM (2002)
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Fpga intrinsic pufs and their use for ip protection. In: International workshop on Cryptographic Hardware and Embedded Systems. pp. 63–80. Springer (2007)
Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Audio-and Video-Based Biometric Person Authentication. pp. 393–402. Springer (2003)
Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic pufs from flip-flops on reconfigurable devices. In: 3rd Benelux workshop on information and system security (WISSec 2008). vol. 17 (2008)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC press (1996)
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026–2030 (2002)
STMicroelectronics: RM0090 Reference manual (10 2015)
Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. Journal of network and computer applications 42, 120–134 (2014)
Zhao, S., Zhang, Q., Hu, G., Qin, Y., Feng, D.: Providing root of trust for arm trustzone using on-chip sram. In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices. pp. 25–36. ACM (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Amelino, D., Barbareschi, M., Mazzeo, A. (2017). Chain-of-Trust for Microcontrollers using SRAM PUFs: the Linux Case Study. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_72
Download citation
DOI: https://doi.org/10.1007/978-3-319-49109-7_72
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49108-0
Online ISBN: 978-3-319-49109-7
eBook Packages: EngineeringEngineering (R0)