Abstract

Physical Unclonable Functions (PUFs) have gained a great interest for their capability to identify devices uniquely and to be a lightweight primitive in cryptographic protocols. However, several reported attacks have shown that virtual copies (mathematical clones) as well as physical clones of PUFs are possible, so that they cannot be considered as tamper-resistant or tamper-evident, as claimed. The solution presented in this article is to extend the PUFs reported until now, which are only physical, to make them Behavioral and Physical Unclonable Functions (BPUFs). Given a challenge, BPUFs provide not only a physical but also a behavioral distinctive response caused by manufacturing process variations. Hence, BPUFs are more difficult to attack than PUFs since physical and behavioral responses associated to challenges have to be predicted or cloned. Behavioral responses that are obtained from several measurements of the physical responses taken at several sample times are proposed. In this way, the behavioral responses can detect if the physical responses are manipulated. The analysis done for current PUFs is extended to allow for more versatility in the responses that can be considered in BPUFs. Particularly, Jaccard instead of Hamming distances are proposed to evaluate the similarity of behavioral responses. As example to validate the proposed solution, BPUFs based on Static Random-Access Memories (SRAM BPUFs), with one physical and one behavioral responses to given challenges, were analyzed experimentally using integrated circuits fabricated in a 90-nm CMOS technology. If an attacker succeeds in cloning the physical responses as reported, but does not attack the way to obtain the behavioral responses, the attacker fails on SRAM BPUFs. The highest probability to succeed in cloning the behavioral responses with a brute-force attack was estimated from experimental results as $1.5 \cdot 10^{-34}$ , considering the influence of changes in the operating conditions (power supply voltage, temperature, and aging).

Highlights

  • The protection of information is of crucial importance, especially when dealing with sensitive data

  • Since the proposed behavioral responses of Behavioral and Physical Unclonable Functions (BPUFs) are obtained from several measurements of the physical responses taken at several sample times, they can detect if the physical responses are provided by the virtual or physical clones resulting from the machine learning and physical attacks reported to current Physical Unclonable Functions (PUFs)

  • Physical clones of BPUFs are more challenging to obtain since cloning physical responses that are not static but change over time is much more difficult

Read more

Summary

INTRODUCTION

The protection of information is of crucial importance, especially when dealing with sensitive data. Using optical semi-invasive attacks from the chip backside (photonic emission analysis, laser fault injection, and optical contactless probing), the work in [17] demonstrates that the responses generated by a PUF can be predicted, manipulated and directly probed without affecting the behavior of the PUF, so that they cannot be considered as tamper-evident or tamper-resistant This is demonstrated in [18] by using laser stimulation for semi-invasive, backside, single-trace readout of logic states in SRAMs. the works in [19], [20] show that SRAM PUFs can be fully characterized and emulated and cloned physically. The attacks to BPUFs are more complex than to PUFs since, on the one side, more responses have to be predicted or cloned for an arbitrary challenge and, on the other side, the behavioral responses proposed can detect if the physical responses are alive (they show changes over time) or lifeless (they are always the same).

BACKGROUND
RESPONSE SIMILARITY
AUTHENTICATION BASED ON PUFs
AUTHENTICATION BASED ON BPUFs
SECURITY IMPROVEMENT WITH BPU
RESISTANCE TO REPORTED ATTACKS
EXPERIMENTAL RESULTS OF SRAM BPU
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call