skip to main content
10.1145/2897795.2897808acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

PUF designed with Resistive RAM and Ternary States

Published: 05 April 2016 Publication History

Abstract

The designs of Physically Unclonable Functions (PUFs) described in this paper are based on Resistive RAMs incorporating ternary states with the objective to reduce false negative authentications (FNA) with low Challenge-Response-Pair (CRP) error rates. Unlike other error correction method, the method is not increasing false positive authentications (FPA). The ternary states, the "Xs", allow the blanking of all cells that are not characterized as consistently capable to generate stable and easy to read "1s" or "0s" PUF challenges. Experimental data extracted from Cu/TaOx/Pt Resistive RAM samples confirms that such a method can generate CRPs having error rates below 8 ppm useable for secure hardware authentication. Random Number Generators (RNG) can also be enhanced by the same ternary architecture.

References

[1]
Yier Jin; Introduction to hardware security, Electronics 2015, 4, 763--784;
[2]
Zheng Gong, Marc X. Makkes; 2011; Hardware Trojan Side-Channels Based on PUF; Information Security, Volume 6633, Notes in Computer Science pp 294--303.
[3]
David. Naccache and Patrice. Frémanteau; Aug. 1992; Unforgeable identification device, identification device reader and method of identification; PatentUS5434917.
[4]
Ravikanth Pappu, Ben. Recht, Jason Taylor, and Neil Gershenfield; 20 Sept 2002; Physical one-way functions; Science. Vol 297 No5589 pp2026--2030.
[5]
R. Maes, P. Tuyls and I. Verbauwhede, "A Soft Decision Helper Data Algorithm for SRAM PUFs," in 2009 IEEE International Symposium on Information Theory, 2009.
[6]
M. Hiller, M. Weiner, L. Rodrigues, M. Birkner and G. and Sigl, "Breaking through Fixed PUF Block Limitations with DSC and Convolutional Codes," in TrustED'13, 2013.
[7]
Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan, and Steven Swanson; June 2011; Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations; 4th international conference on Trust and trustworthy computing.
[8]
Daniel E. Holcomb, Wayne P. Burleson, Kevin Fu; Nov 2008; Power-up SRAM state as an Identifying Fingerprint and Source of TRN; IEEE Trans. on Comp., vol 57, No 11.
[9]
Todd A. Christensen, John E Sheets II; Oct. 30, 2012; Implementing PUF utilizing EDRAM memory cell capacitance variation; Patent No.: US 8,300,450 B2.
[10]
Xiaochun Zhu, Steven Millendorf, Xu Guo, David M. Jacobson, Kangho Lee, Seung H. Kang, Matthew M. Nowak, Daha Fazla; March 2015; PUFs based on resistivity of MRAM magnetic tunnel junctions; Patents. US 2015/0071432 A1.
[11]
Elena I. Vatajelu, Giorgio Di Natale, Mario Barbareschi, Lionel Torres, Marco Indaco, and Paolo Prinetto; July 2015; STT-MRAM-Based PUF Architecture exploiting Magnetic Tunnel Junction Fabrication-Induced Variability; ACM transactions.
[12]
Anuj Gupta, May 2005, Implementing Generic BIST for testing Kilo-Bit Memories; Master Thesis No-6030402 Deemed University Patiala India.
[13]
Dai Yamamoto, Kazuo Sakiyama, Kazuo Ohto, and Masahiko Itoh; 2011; Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches; CHES 2011 Lecture Notes in Computer Science Volume 6917, pp 390--406.
[14]
Bertrand Cambou; June 24, 2015; Memory circuits using a blocking state; US Patent Application No: 22728483.
[15]
Bertrand. Cambou; June2, 2015; ReRAM architectures for secure systems; US Patent Application No 62/169957.
[16]
Bertrand Cambou, Neal Burger, Mourad El Baraji; May, 2014; Apparatus system, and method for matching patterns with an ultra-fast check engine, US Patent No 8,717,794B2.
[17]
Bertrand. Cambou; Jul 16, 2015; Multi-factor authentication using a combined secure pattern; US Patent Application No 22938751.
[18]
Christian Krutzik; Jan 2015; Solid state drive Physical Unclonable Function erase verification device and method; US Patent Application publication US 2015/0007337 A1.
[19]
Dominik Merli, Frederic Stumpf, Georg Sigl; 2013; Protecting PUF Error Correction by Codeword Masking; IACR Cryptography, e-print archive 2013: 334.
[20]
Gargi Ghosh and Marius Orlowski; 2015; Write and Erase Threshold Voltage Interdependence in Resistive Switching Memory Cells; IEEE trans. on Electron Devices, 62(9), pp. 2850--2857.
[21]
An Chen; 2015; Comprehensive Assessment of RRAM-based PUF for Hardware Security Applications; 978-1-4673-9894-7/15/IEDM IEEE.

Cited By

View all
  • (2025)Two-Dimensional Materials for Brain-Inspired Computing HardwareChemical Reviews10.1021/acs.chemrev.4c00631Online publication date: 2-Jan-2025
  • (2025)Encoder decoder-based Virtual Physically Unclonable Function for Internet of Things device authentication using split-learningComputers and Security10.1016/j.cose.2024.104164148:COnline publication date: 1-Jan-2025
  • (2024)MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learningComputers & Security10.1016/j.cose.2024.103905143(103905)Online publication date: Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CISRC '16: Proceedings of the 11th Annual Cyber and Information Security Research Conference
April 2016
150 pages
ISBN:9781450337526
DOI:10.1145/2897795
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Oak Ridge National Laboratory

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 April 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data protection
  2. Encryption
  3. Hardware Authentication
  4. Physically Unclonable Functions
  5. Resistive RAM
  6. Secure Memory

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CISRC '16

Acceptance Rates

CISRC '16 Paper Acceptance Rate 11 of 28 submissions, 39%;
Overall Acceptance Rate 69 of 136 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)4
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Two-Dimensional Materials for Brain-Inspired Computing HardwareChemical Reviews10.1021/acs.chemrev.4c00631Online publication date: 2-Jan-2025
  • (2025)Encoder decoder-based Virtual Physically Unclonable Function for Internet of Things device authentication using split-learningComputers and Security10.1016/j.cose.2024.104164148:COnline publication date: 1-Jan-2025
  • (2024)MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learningComputers & Security10.1016/j.cose.2024.103905143(103905)Online publication date: Aug-2024
  • (2024)Hardware Trojans Detection and Prevention Techniques ReviewWireless Personal Communications10.1007/s11277-024-11334-6136:2(1147-1182)Online publication date: 25-Jun-2024
  • (2024)A Novel Approach to Optimize Response-Based Cryptography for Secure Data TransmissionProceedings of the Future Technologies Conference (FTC) 2024, Volume 410.1007/978-3-031-73128-0_15(226-248)Online publication date: 6-Nov-2024
  • (2024)True Random Numbers from Pairs of SRAM DevicesIntelligent Computing10.1007/978-3-031-62269-4_41(630-650)Online publication date: 21-Jun-2024
  • (2023)MRAM Devices to Design Ternary Addressable Physically Unclonable FunctionsElectronics10.3390/electronics1215330812:15(3308)Online publication date: 2-Aug-2023
  • (2023)Design of a True Random Number Generator Based on MRAM DevicesIntelligent Computing10.1007/978-3-031-37963-5_90(1320-1341)Online publication date: 20-Aug-2023
  • (2023)MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoTSecurity and Privacy in Communication Networks10.1007/978-3-031-25538-0_8(130-149)Online publication date: 4-Feb-2023
  • (2022)Strong PUF Enrollment with Machine Learning: A Methodical ApproachElectronics10.3390/electronics1104065311:4(653)Online publication date: 19-Feb-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media