ABSTRACT
Conventional silicon physical unclonable function (PUF) extracts fingerprints from transistor's analog attributes, which are vulnerable to environmental and operational variations. Recently, digitalized PUF prototypes have emerged to overcome the vulnerability issues, however, the existing prototypes are either hybrid of analog-digital PUFs which are still under the shadow of vulnerability, or impractical for real-world implementation. To address the above limitations, we propose a learning resilient and reliable digital PUF (LRR-DPUF). The fingerprints are extracted from VLSI interconnect geometrical randomness induced by lithography variations. Crucially, we use strongly skewed latches to ensure the immunity against environmental and operational variations. Further, a cross-coupled, highly non-linear logic network is proposed to effectively spread and augment even subtle interconnect randomness, as well as to achieve strong resilience to machine learning attacks. We demonstrate that a 64-bit LRR-DPUF exhibits close to ideal statistical performances, including 0 intra Hamming Distance. We also mathematically prove that each output of the LRR-DPUF follows uniform distribution. Various state-of-the-art machine learning models show almost no better than random prediction accuracies when applied to LRR-DPUF.
- [1]. . Physically unclonable functions: manufacturing variability as an unclonable device identifier. In Proc. GLSVLSI, pages 455–460, 2011.Google Scholar
- [2]. . Physical unclonable functions and applications: A tutorial. Proceedings of the IEEE, 102 (8):1126–1141, 2014.Google Scholar
- [3]. , PUF?: Trends and challenges of emerging physical-disorder based security. In Proc. DATE, pages 352:1–352:6, 2014.Google Scholar
- [4]. . Testing techniques for hardware security. In Proc. ITC, pages 1–10, 2008.Google Scholar
- [5]. . Practical public puf enabled by solving max-flow problem on chip. In Proceedings of the 53rd Annual Design Automation Conference, DAC'16, pages 164:1–164:6. ACM, 2016.Google Scholar
- [6]. . Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Transactions on Computers, 58 (9):1198–1210, 2009.Google ScholarDigital Library
- [7]. . Modeling SRAM start-up behavior for physical unclonable functions. In Proc. DFT, pages 1–6, 2012.Google Scholar
- [8]. . RESP: A robust physical unclonable function retrofitted into embedded SRAM array. In Proc, DAC, pages 60:1–60:9, 2013.Google Scholar
- [9]. . Silicon physical random functions. In Proc. CCS, pages 148–160, 2002.Google Scholar
- [10]. . Physical unclonable functions for device authentication and secret key generation. In Proc. DAC, pages 9–14, 2007.Google Scholar
- [11]. . The butterfly PUF protecting IP on every FPGA. In Proc. HOST, pages 67–70, 2008.Google Scholar
- [12].Qu Gang and Yin Chi-En. Temperature-aware cooperative ring oscillator PUF. In Proc. HOST, pages 36–42, 2009.Google Scholar
- [13]. . Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proc. EUROCRYPT, pages 523–540, 2004.Google Scholar
- [14]. . PUFKY: A fully functional PUF-based cryptographic key generator. In Proc. CHES, pages 302–319.Springer 2012.Google Scholar
- [15]. . PUF modeling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security, 8 (11):1876–1891, 2013.Google ScholarDigital Library
- [16]. . Hybrid side-channel/machine-learning attacks on PUFs: A new threat? In Proc. DATE, pages 349:1–349:6, 2014.Google Scholar
- [17]. . Robust and flexible FPGA-based digital PUF. In Proc. FPL, pages 1–6, 2014.Google Scholar
- [18]. . Digital PUF using intentional faults. In Proc. ISQED, pages 448–451, 2015.Google Scholar
- [19]. . On the geometric separability of boolean functions. Discrete Applied Mathematics, 66 (3):205–218, 1996.Google ScholarDigital Library
- [20]. . Litho-aware and low power design of a secure current-based physically unclonable function. In Proc. ISLPED, pages 402–407, 2013.Google Scholar
- [21]. . Physically unclonable functions for embeded security based on lithographic variation. In Proc. DATE, pages 1–6, 2011.Google Scholar
- [22]. . On improving the uniqueness of silicon-based physically unclonable functions via optical proximity correction. In Proc. DAC, pages 96–105, 2012.Google Scholar
- [23]. . The mask error factor in optical lithography. IEEE TSM, 13 (2):235–242, 2000.Google Scholar
- [24]. . Characterization of 1D layout technology at advanced nodes and low k1. In Proc. SPIE, volume 905213–905213, 2014.Google Scholar
- [25]. . Fundamental limit of ebeam lithography. In Proc. SPIE, volume 6607, 2007.Google Scholar
- [26]. . ICCAD-2013 CAD contest in mask optimization and benchmark suite. InProc. ICCAD, pages 271–274, 2013.Google Scholar
- [27]. . MEEF as a matrix In Photomask, pages 980–991, 2002.Google ScholarCross Ref
- [28]. . A systematic method to evaluate and compare the performance of physical unclonable functions. In Embedded Systems Design with FPGAs, pages 245–267.Springer 2013.Google ScholarCross Ref
- [29]. . Physically based models of electromigration: from Black's equation to modern TCAD models. Microelectronics Reliability, 50 (6):775–789, 2010.Google Scholar
- [30]. . Coupled analysis of electromigration reliability and performance in ULSI signal nets. In Proc. ICCAD, pages 158–164, 2001.Google Scholar
- [31]. . Circuit reliability simulator for interconnect, via, and contact electromigration. IEEE TED, 39 (11):2472–2479, 1992.Google ScholarCross Ref
Index Terms
- LRR-DPUF: Learning resilient and reliable digital physical unclonable function
Recommendations
Modeling attacks on physical unclonable functions
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityWe show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves ...
A Modeling Attack Resilient Physical Unclonable Function Based on STT-MRAM
GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSIPhysical unclonable function (PUF) is considered as a promising hardware security primitive for a variety of applications. Recently, with the rapid development of integrated circuit (IC), the requirement for low complexity, high power efficiency and ...
A transmission gate physical unclonable function and on-chip voltage-to-digital conversion technique
DAC '13: Proceedings of the 50th Annual Design Automation ConferenceA physical unclonable function (PUF) is an embedded integrated circuit (IC) structure that is designed to leverage naturally occurring variations to produce a random bitstring. In this paper, we evaluate a PUF which leverages resistance variations which ...
Comments