Abstract | ||
---|---|---|
Physical unclonable functions (PUFs) can be used for a number of security applications, including secure on-chip generation of secret keys. We introduce an embedded PUF concept called sensitized path PUF (SP-PUF) that is based on extracting entropy out of inherent timing variability of modules already present in the circuit. The new PUF sensitizes paths of nearly identical lengths and generates response bits by racing transitions through different paths against each other. SP-PUF has lower area overhead and higher speed than earlier embedded PUFs and requires no helper data stored in non-volatile memory beyond standard error-correction information for fuzzy extraction. Compared with standalone PUFs, the new solution intrinsically and inseparably intertwines PUF behavior with functional circuitry, thus complicating invasive attacks or simplifying their detection. We present a systematic design flow to turn an arbitrary (sufficiently complex) circuit into an SP-PUF. The flow leverages state-of-the-art sensitization algorithms, formal filtering based on statistical analysis, and MaxSAT-based optimization of SP-PUF's area overhead. Experiments show that SP-PUF extracts 256-bit keys with perfect reliability and nearly perfect uniqueness after fuzzy extraction for the majority of standard benchmark circuits. |
Year | Venue | Field |
---|---|---|
2017 | DATE | Logic gate,System on a chip,Computer science,Fuzzy logic,Filter (signal processing),Real-time computing,Design flow,Physical unclonable function,Electronic circuit,Multiplexing,Embedded system |
DocType | ISSN | Citations |
Conference | 1530-1591 | 1 |
PageRank | References | Authors |
0.37 | 20 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Matthias Sauer | 1 | 195 | 20.02 |
Pascal Raiola | 2 | 3 | 2.77 |
Linus Feiten | 3 | 12 | 5.05 |
B. Becker | 4 | 191 | 21.44 |
Ulrich Rührmair | 5 | 685 | 38.92 |
Ilia Polian | 6 | 889 | 78.66 |