Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2847263.2847312acmconferencesArticle/Chapter ViewAbstractPublication PagesfpgaConference Proceedingsconference-collections
poster

DCPUF: Placement and Routing Constraint based Dynamically Configured Physical Unclonable Function on FPGA (Abstact Only)

Published: 21 February 2016 Publication History

Abstract

With the development of Integrated Circuit (IC), it is a growing trend that the CPU and the FPGA are integrated into one chip. To improve the security of CPU+FPGA IC, we explore the reconfigurable feature of FPGA to implement a novel Dynamically Configured Physical Unclonable Function (DCPUF). PUF is a hardware security primitive that utilizes unpredictable process variations to produce particular challenge-response pairs, so even the chips with the same design would produce different responses for the same challenge. In the DCPUF, the FPGA configuration bits, which are specifically designed with dedicated placement and routing constraint, constitute the challenge. When a challenge is input to a CPU+FPGA IC, the CPU uses it to configure or partially configure the FPGA, and then waits for the FPGA to reply a response. In comparison with existing PUFs, the DCPUF has three major advantages: (1) different from existing PUFs with fixed designs, the logic of DCPUF is dynamically configured for each challenge, i.e. the circuits for producing different responses are different, leading to higher security; (2) much more electronic parameters affected by process variation are leveraged to make DCPUF more robust against attacks; (3) for CPU+FPGA IC, no extra hardware is needed. The experiments on real CPU+FPGA ICs show the proposed DCPUF keeps good randomness and stability.

References

[1]
R. Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems," Wiley, 2008.
[2]
U. Ruhrmair, D. E. Holcomb, "PUFs at a Glance," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014.
[3]
B. Gassend, D. Clarke, M. Dijk, S. Devadas, "Controlled Physical Random Functions," Annual Computer Security Applications Conference (ACSAC), pp. 149--160, 2002.
[4]
B. Gassend, D. Clarke, M. Dijk, S. Devadas, "Silicon Physical Random Functions," Conference on Computer and Communications Security (CCS), pp. 148--160, 2002.
[5]
J. Guajardo, S. S. Kumar, G.-J. Schrijen, P. Tuyls, "FPGA Intrinsic PUFs and Their Use for IP Protection," Cryptographic Hardware and Embedded Systems (CHES), pp. 63--80, 2007.
[6]
P. Tuyls, G. J. Schrijen, B. Skoric, J. V. Geloven, N. Verhaegh, R. Wolters, "Read-Proof Hardware from Protective Coatings," Cryptographic Hardware and Embedded Systems (CHES), pp. 369--383, 2006.
[7]
M. S. Hashemian, B. Singh, F. Wolff, D. Weyer, S. Clay, C. Papachristou, "A Robust Authentication Methodology using Physically Unclonable Functions in DRAM Arrays," Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 647--652, 2015.
[8]
P. Koeberl, U. Kocabas, A.-R. Sadeghi, "Memristor PUFs - A New Generation of Memory based Physical Unclonable Functions," Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 428--431, 2013.
[9]
D. Lim, "Extracting Secret Keys from Integrated Circuits," MSc Thesis, MIT, 2004.
[10]
G. E. Suh, S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," Design Automation Conference (DAC), pp. 9--14, 2007.
[11]
M. Majzoobi, F. Koushanfar, M. Potkonjak, "Lightweight Secure PUFs," International Conference on Computer-Aided Design (ICCAD), pp. 670--673, 2008.
[12]
J. Ye, Y. Hu, X. Li, "OPUF: Obfuscation Logic Based Physical Unclonable Function," IEEE International On-Line Testing Symposium (IOLTS), pp. 156--161, 2015.
[13]
M. Majzoobi, F. Koushanfar, S. Devadas, "FPGA PUF using Programmable Delay Lines," International Workshop on Information Forensics and Security (WIFS), 2010.
[14]
M. Gao; K. Lai; G. Qu, "A Highly Flexible Ring Oscillator PUF," Design Automation Conference (DAC), 2014.
[15]
C. Helfmeier, C.Boit, D. Nedospasov, J.-P. Seifert, "Cloning Physical Unclonable Function," Hardware-Oriented Security and Trust (HOST), 2013.
[16]
U. Ruhrmair, J. Solter, F. Sehnke, X. Xiaolin, A. Mahmoud, V. Stoyanova, G. Dror, J. Schmidhuber, W. Burleson, S. Devadas, "PUF Modeling Attacks on Simulated and Silicon Data," IEEE Transactions on Information Forensics and Security (TIFS), vol. 8, no. 11, pp. 1876--1891, 2013.
[17]
D. P. Sahoo, H. N. Phuong, D. Mukhopadhyay, R. S. Chakraborty, "A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, no. 8, pp. 1334--1343, 2015.
[18]
T. B. Georg, K. Raghavan, "Active and Passive Side-Channel Attacks on Delay Based PUF Designs," International Association for Cryptologic Research (IACR), 2014.
[19]
T. B. Georg, "The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs," Cryptographic Hardware and Embedded Systems (CHES), 2015.
[20]
S. Hadjis, A. Canis, R. Sobue, Y. Hara-Azumi, H. Tomiyama, J. Anderson, "Profiling-Driven Multi-Cycling in FPGA High-Level Synthesis," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2015.
[21]
S. Hamdioui, J.-L. Danger, G. D. Natale, F. Smailbegovic, G. Battum, M. Tehranipoor, "Hacking and Protecting IC Hardware," Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014.

Cited By

View all
  • (2017)LAPS: Layout-Aware Path Selection for Post-Silicon Timing CharacterizationIEICE Transactions on Information and Systems10.1587/transinf.2016EDP7184E100.D:2(323-331)Online publication date: 2017
  • (2017)Polymorphic PUF: Exploiting reconfigurability of CPU+FPGA SoC to resist modeling attack2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS)10.1109/IOLTS.2017.8046220(205-206)Online publication date: Jul-2017
  • (2017)Polymorphic PUF: Exploiting reconfigurability of CPU+FPGA SoC to resist modeling attack2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)10.1109/AsianHOST.2017.8353993(43-48)Online publication date: Oct-2017

Index Terms

  1. DCPUF: Placement and Routing Constraint based Dynamically Configured Physical Unclonable Function on FPGA (Abstact Only)

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    FPGA '16: Proceedings of the 2016 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays
    February 2016
    298 pages
    ISBN:9781450338561
    DOI:10.1145/2847263
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 February 2016

    Check for updates

    Author Tags

    1. cpu+fpga ic
    2. placement and routing constraint
    3. puf
    4. reconfiguration

    Qualifiers

    • Poster

    Funding Sources

    Conference

    FPGA'16
    Sponsor:

    Acceptance Rates

    FPGA '16 Paper Acceptance Rate 20 of 111 submissions, 18%;
    Overall Acceptance Rate 125 of 627 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 24 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)LAPS: Layout-Aware Path Selection for Post-Silicon Timing CharacterizationIEICE Transactions on Information and Systems10.1587/transinf.2016EDP7184E100.D:2(323-331)Online publication date: 2017
    • (2017)Polymorphic PUF: Exploiting reconfigurability of CPU+FPGA SoC to resist modeling attack2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS)10.1109/IOLTS.2017.8046220(205-206)Online publication date: Jul-2017
    • (2017)Polymorphic PUF: Exploiting reconfigurability of CPU+FPGA SoC to resist modeling attack2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)10.1109/AsianHOST.2017.8353993(43-48)Online publication date: Oct-2017

    View Options

    Login options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media