skip to main content
10.1145/2966986.2967051guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

LRR-DPUF: Learning resilient and reliable digital physical unclonable function

Authors Info & Claims
Published:07 November 2016Publication History

ABSTRACT

Conventional silicon physical unclonable function (PUF) extracts fingerprints from transistor's analog attributes, which are vulnerable to environmental and operational variations. Recently, digitalized PUF prototypes have emerged to overcome the vulnerability issues, however, the existing prototypes are either hybrid of analog-digital PUFs which are still under the shadow of vulnerability, or impractical for real-world implementation. To address the above limitations, we propose a learning resilient and reliable digital PUF (LRR-DPUF). The fingerprints are extracted from VLSI interconnect geometrical randomness induced by lithography variations. Crucially, we use strongly skewed latches to ensure the immunity against environmental and operational variations. Further, a cross-coupled, highly non-linear logic network is proposed to effectively spread and augment even subtle interconnect randomness, as well as to achieve strong resilience to machine learning attacks. We demonstrate that a 64-bit LRR-DPUF exhibits close to ideal statistical performances, including 0 intra Hamming Distance. We also mathematically prove that each output of the LRR-DPUF follows uniform distribution. Various state-of-the-art machine learning models show almost no better than random prediction accuracies when applied to LRR-DPUF.

References

  1. [1].Verbauwhede Ingrid and Maes Roel. Physically unclonable functions: manufacturing variability as an unclonable device identifier. In Proc. GLSVLSI, pages 455460, 2011.Google ScholarGoogle Scholar
  2. [2].Herder Charles, Yu Meng-Day, Koushanfar Farinaz, and Devadas Srinivas. Physical unclonable functions and applications: A tutorial. Proceedings of the IEEE, 102 (8):11261141, 2014.Google ScholarGoogle Scholar
  3. [3].Masoud Rostami, James B Wendt, Potkonjak Miodrag, and Koushanfar Farinaz. vadis Quo, PUF?: Trends and challenges of emerging physical-disorder based security. In Proc. DATE, pages 352:1352:6, 2014.Google ScholarGoogle Scholar
  4. [4].Majzoobi Mehrdad, Koushanfar Farinaz, and Potkonjak Miodrag. Testing techniques for hardware security. In Proc. ITC, pages 110, 2008.Google ScholarGoogle Scholar
  5. [5].Li Meng, Miao Jin, Zhong Kai, and David Z. Pan. Practical public puf enabled by solving max-flow problem on chip. In Proceedings of the 53rd Annual Design Automation Conference, DAC'16, pages 164:1164:6. ACM, 2016.Google ScholarGoogle Scholar
  6. [6].Holcomb Daniel E., Burleson Wayne P., and Fu Kevin. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Transactions on Computers, 58 (9):11981210, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7].Cortez Mafalda, Dargar Apurva, Hamdioui Said, and Schrijen Geert-Jan. Modeling SRAM start-up behavior for physical unclonable functions. In Proc. DFT, pages 16, 2012.Google ScholarGoogle Scholar
  8. [8].Yu Zheng, Maryam S. Hashemian, and Bhunia Swarup. RESP: A robust physical unclonable function retrofitted into embedded SRAM array. In Proc, DAC, pages 60:160:9, 2013.Google ScholarGoogle Scholar
  9. [9].Gassend Blaise, Clarke Dwaine, Van Dijk Marten, and Devadas Srinivas. Silicon physical random functions. In Proc. CCS, pages 148160, 2002.Google ScholarGoogle Scholar
  10. [10].Edward Suh G. and Devadas Srinivas. Physical unclonable functions for device authentication and secret key generation. In Proc. DAC, pages 914, 2007.Google ScholarGoogle Scholar
  11. [11].Kumar Sandeep S., Guajardo Jorge, Maes Roel, Schrijen Geert-Jan, and Tuyls Pim. The butterfly PUF protecting IP on every FPGA. In Proc. HOST, pages 6770, 2008.Google ScholarGoogle Scholar
  12. [12].Qu Gang and Yin Chi-En. Temperature-aware cooperative ring oscillator PUF. In Proc. HOST, pages 3642, 2009.Google ScholarGoogle Scholar
  13. [13].Dodis Yevgeniy, Reyzin Leonid, and Smith Adam. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proc. EUROCRYPT, pages 523540, 2004.Google ScholarGoogle Scholar
  14. [14].Maes Roel, Van Herrewege Anthony, and Verbauwhede Ingrid. PUFKY: A fully functional PUF-based cryptographic key generator. In Proc. CHES, pages 302319.Springer 2012.Google ScholarGoogle Scholar
  15. [15].Ruhrmair Ulrich, Solter Jan, Sehnke Frank, Xu Xiaolin, Mahmoud Ali, Stoyanova Vera, Dror Gideon, Schmidhuber Jurgen, Burleson Wayne, and Devadas Srinivas. PUF modeling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security, 8 (11):18761891, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16].Xu Xiaolin and Burleson Wayne. Hybrid side-channel/machine-learning attacks on PUFs: A new threat? In Proc. DATE, pages 349:1349:6, 2014.Google ScholarGoogle Scholar
  17. [17].Xu Teng and Potkonjak Miodrag. Robust and flexible FPGA-based digital PUF. In Proc. FPL, pages 16, 2014.Google ScholarGoogle Scholar
  18. [18].Xu Teng and Potkonjak Miodrag. Digital PUF using intentional faults. In Proc. ISQED, pages 448451, 2015.Google ScholarGoogle Scholar
  19. [19].Hegedüs Tibor and Megiddo Nimrod. On the geometric separability of boolean functions. Discrete Applied Mathematics, 66 (3):205218, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20].Kumar Raghavan and Burleson Wayne. Litho-aware and low power design of a secure current-based physically unclonable function. In Proc. ISLPED, pages 402407, 2013.Google ScholarGoogle Scholar
  21. [21].Sreedhar Aswin and Kundu Sandip. Physically unclonable functions for embeded security based on lithographic variation. In Proc. DATE, pages 16, 2011.Google ScholarGoogle Scholar
  22. [22].Forte Domenic and Srivastava Ankur. On improving the uniqueness of silicon-based physically unclonable functions via optical proximity correction. In Proc. DAC, pages 96105, 2012.Google ScholarGoogle Scholar
  23. [23].Wong Alfred K., Ferguson Richard A., and Mansfield Scott M.. The mask error factor in optical lithography. IEEE TSM, 13 (2):235242, 2000.Google ScholarGoogle Scholar
  24. [24].Axelrad V., Mikami K., Smayling M., Tsujita K., and Yaegashi H.. Characterization of 1D layout technology at advanced nodes and low k1. In Proc. SPIE, volume 905213–905213, 2014.Google ScholarGoogle Scholar
  25. [25].Cheng Wen-Hao and Farnsworth Jeff. Fundamental limit of ebeam lithography. In Proc. SPIE, volume 6607, 2007.Google ScholarGoogle Scholar
  26. [26].Banerjee Shayak, Li Zhuo, and Sani R. Nassif. ICCAD-2013 CAD contest in mask optimization and benchmark suite. InProc. ICCAD, pages 271274, 2013.Google ScholarGoogle Scholar
  27. [27].Granik Yuri and Cobb Nicolas B.. MEEF as a matrix In Photomask, pages 980991, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28].Maiti Abhranil, Gunreddy Vikash, and Schaumont Patrick. A systematic method to evaluate and compare the performance of physical unclonable functions. In Embedded Systems Design with FPGAs, pages 245267.Springer 2013.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29].De R.L. Hajdin Ceric Orio, and Selberherr Siegfried. Physically based models of electromigration: from Black's equation to modern TCAD models. Microelectronics Reliability, 50 (6):775789, 2010.Google ScholarGoogle Scholar
  30. [30].Banerjee Kaustav and Mehrotra Amit. Coupled analysis of electromigration reliability and performance in ULSI signal nets. In Proc. ICCAD, pages 158164, 2001.Google ScholarGoogle Scholar
  31. [31].Liew Boon-Khin, Fang Peng, Cheung Nathan W., and Hu Chenming. Circuit reliability simulator for interconnect, via, and contact electromigration. IEEE TED, 39 (11):24722479, 1992.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. LRR-DPUF: Learning resilient and reliable digital physical unclonable function
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image Guide Proceedings
        2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
        Nov 2016
        946 pages

        Copyright © 2016

        Publisher

        IEEE Press

        Publication History

        • Published: 7 November 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Qualifiers

        • research-article