Skip to main content

Chain-of-Trust for Microcontrollers using SRAM PUFs: the Linux Case Study

  • Conference paper
  • First Online:
Book cover Advances on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2016)

Abstract

Many security challenges have emerged from what is defined as Internet of Things (IoT), due to the inherent permanent connection of devices involved in networks. Furthermore, IoT devices are often deployed in unattended working environment and, hence, they are prone to physical attacks. Attackers take advantages of such weaknesses to clone devices, tamper the software installed on them and extract cryptographic keys. In this paper, we propose a technique to exploit Static Random Access Memory based Phisical Unclonable Functions to have available a chain-oftrust on a microcontroller device. We prove its effectiveness in terms of reliability and required overhead by introducing a case study based on the STM32F7 device running the Linux operating system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amato, F., Barbareschi, M., Casola, V., Mazzeo, A.: An fpga-based smart classifier for decision support systems. In: Intelligent Distributed Computing VII, pp. 289–299. Springer (2014)

    Google Scholar 

  2. Amato, F., De Pietro, G., Esposito, M., Mazzocca, N.: An integrated framework for securing semi-structured health records. Knowledge-Based Systems 79, 99–117 (2015)

    Google Scholar 

  3. Amato, F., Moscato, F.: A model driven approach to data privacy verification in e-health systems. Transactions on Data Privacy 8(3), 273–296 (2015)

    Google Scholar 

  4. Amelino, D., Barbareschi, M., Battista, E., Mazzeo, A.: How to manage keys and reconfiguration in wsns exploiting sram based pufs. In: Intelligent Interactive Multimedia Systems and Services 2016, pp. 109–119. Springer (2016)

    Google Scholar 

  5. Bajikar, S.: Trusted platform module (tpm) based security on notebook pcs-white paper. Mobile Platforms Group Intel Corporation pp. 1–20 (2002)

    Google Scholar 

  6. Barbareschi, M., Battista, E., Mazzeo, A., Mazzocca, N.: Testing 90 nm microcontroller sram puf quality. In: Design & Technology of Integrated Systems In Nanoscale Era (DTIS). pp. 1–6. 2015 10th IEEE International Conference On. IEEE (2015)

    Google Scholar 

  7. Barbareschi, M., Battista, E., Mazzeo, A., Venkatesan, S.: Advancing wsn physical security adopting tpm-based architectures. In: Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on. pp. 394–399. IEEE (2014)

    Google Scholar 

  8. Barbareschi, M., Cilardo, A., Mazzeo, A.: Partial fpga bitstream encryption enabling hardware drm in mobile environments. In: Proceedings of the ACM International Conference on Computing Frontiers. pp. 443–448. ACM (2016)

    Google Scholar 

  9. Barbareschi, M., Di Natale, G., Torres, L.: Ring oscillators analysis for security purposes in spartan-6 fpgas. Microprocessors and Microsystems (2016)

    Google Scholar 

  10. Barker, E., Kelsey, J.: Nist special publication 800-90a: Recommendation for random number generation using deterministic random bit generators (2012)

    Google Scholar 

  11. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference. p. 175. ACM (2015)

    Google Scholar 

  12. Cilardo, A.: New techniques and tools for application-dependent testing of FPGA-based components. IEEE Transactions on Industrial Informatics 11(1), 94–103 (2015)

    Google Scholar 

  13. Cilardo, A., Fusella, E., Gallo, L., Mazzeo, A.: Exploiting concurrency for the automated synthesis of MPSoC interconnects. ACM Transactions on Embedded Computing Systems 14(3) (2015)

    Google Scholar 

  14. Cilardo, A., Mazzeo, A., Romano, L., Saggese, G.: An FPGA-based key-store for improving the dependability of security services. pp. 389–396 (2005)

    Google Scholar 

  15. Cilardo, A., Barbareschi, M., Mazzeo, A.: Secure distribution infrastructure for hardware digitalcontents. IET Computers & Digital Techniques 8(6), 300–310 (2014)

    Google Scholar 

  16. Claes, M., van der Leest, V., Braeken, A.: Comparison of sram and ff puf in 65 nm technology. In: Nordic Conference on Secure IT Systems. pp. 47–64. Springer (2011)

    Google Scholar 

  17. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International Conference on the Theory and Applications of Cryptographic Techniques. pp. 523–540. Springer (2004)

    Google Scholar 

  18. Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM conference on Computer and communications security. pp. 148–160. ACM (2002)

    Google Scholar 

  19. Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Fpga intrinsic pufs and their use for ip protection. In: International workshop on Cryptographic Hardware and Embedded Systems. pp. 63–80. Springer (2007)

    Google Scholar 

  20. Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Audio-and Video-Based Biometric Person Authentication. pp. 393–402. Springer (2003)

    Google Scholar 

  21. Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic pufs from flip-flops on reconfigurable devices. In: 3rd Benelux workshop on information and system security (WISSec 2008). vol. 17 (2008)

    Google Scholar 

  22. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC press (1996)

    Google Scholar 

  23. Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026–2030 (2002)

    Google Scholar 

  24. STMicroelectronics: RM0090 Reference manual (10 2015)

    Google Scholar 

  25. Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. Journal of network and computer applications 42, 120–134 (2014)

    Google Scholar 

  26. Zhao, S., Zhang, Q., Hu, G., Qin, Y., Feng, D.: Providing root of trust for arm trustzone using on-chip sram. In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices. pp. 25–36. ACM (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mario Barbareschi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Amelino, D., Barbareschi, M., Mazzeo, A. (2017). Chain-of-Trust for Microcontrollers using SRAM PUFs: the Linux Case Study. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49109-7_72

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49108-0

  • Online ISBN: 978-3-319-49109-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics