Skip to main content

Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM

  • Conference paper
Trusted Systems (INTRUST 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7222))

Included in the following conference series:

Abstract

The contamination of electronic component supply chains by counterfeit hardware devices is a serious and growing risk in today’s globalized marketplace. Current best practice for detecting counterfeit semiconductors includes visual checking, electrical testing, and reliability testing, all of which require significant investments in expertise, equipment, and time. In TRUST’11, Koeberl, Li, Rajan, Vishik, and Wu proposed a new device authentication scheme using SRAM Physically Unclonable Functions (PUFs) for semiconductor anti-counterfeiting. Their authentication scheme is simple, low cost, and practical. However, the method and corresponding parameters of their scheme are based on a theoretical SRAM PUF model without support from real experimental data. In this paper, we evaluate a real SRAM PUF on a discrete 0.13um SRAM, and use the PUF result to evaluate this device authentication scheme and show that this scheme indeed works well. We identify several gaps between the theoretical model and the experimental SRAM PUF result, and adjust the parameters of the scheme accordingly. In addition, we provide a new post-processing function that results in a smaller false rejection rate and false acceptance rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: PUF-PRFs: A new tamper-resilient cryptographic primitive. In: Advances in Cryptology – EUROCRYPT 2009 Poster Session, pp. 96–102 (2000)

    Google Scholar 

  2. Azizi, N., Moshovos, A., Najm, F.N.: Low-leakage asymmetric-cell sram. In: Proceedings of the 2002 International Symposium on Low Power Electronics and Design, ISLPED 2002, pp. 48–51. ACM, New York (2002)

    Chapter  Google Scholar 

  3. Bulens, P., Standaert, F.-X., Quisquater, J.-J.: How to strongly link data and its medium: the paper case. IET Information Security 4(3), 125–136 (2010)

    Article  Google Scholar 

  4. Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security, pp. 148–160. ACM Press, New York (2002)

    Google Scholar 

  5. Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63–80. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Holcomb, D.E., Burleson, W.P., Fu, K.: Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Conference on RFID Security 2007, Malaga, Spain, July 11-13 (2007)

    Google Scholar 

  7. Kim, J.-J., Rao, R., Kim, K.: Technology-circuit co-design of asymmetric sram cells for read stability improvement. In: 2010 IEEE Custom Integrated Circuits Conference (CICC), pp. 1–4 (September 2010)

    Google Scholar 

  8. Koeberl, P., Li, J., Rajan, A., Vishik, C., Wu, W.: A Practical Device Authentication Scheme Using SRAM PUFs. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 63–77. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic pufs from flip-flops on reconfigurable devices. In: 3rd Benelux Workshop on Information and System Security (WISSec 2008), Eindhoven, NL, p. 17 (2008)

    Google Scholar 

  10. Maes, R., Tuyls, P., Verbauwhede, I.: Soft decision helper data algorithm for sram pufs. In: Proceedings of the 2009 IEEE International Conference on Symposium on Information Theory, ISIT 2009, vol. 3, pp. 2101–2105. IEEE Press, Piscataway (2009)

    Google Scholar 

  11. Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)

    Google Scholar 

  12. U. S. G. A. Office. Defense supplier base: Dod should leverage ongoing initiatives in developing its program to mitigate risk of counterfeit parts. GAO-10-389 (March 2010)

    Google Scholar 

  13. Pappu, R.S.: Physical one-way functions. PhD thesis, Massachusetts Institute of Technology (March 2001)

    Google Scholar 

  14. SEMI T20-1109. Specification for authentication of semiconductors and related products (2009), http://www.semi.org/

  15. Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9–14. ACM Press, New York (2007)

    Google Scholar 

  16. Trusted Computing Group. TCG TPM specification 1.2 (2003), http://www.trustedcomputinggroup.org

  17. von Neumann, J.: Various techniques used in connection with random digits. In: Householder, A.S., et al. (eds.) The Monte Carlo Method. National Bureau of Standards, Applied Mathematics Series, vol. 12, pp. 36–38 (1951)

    Google Scholar 

  18. Xilinx Inc. ML501 Evaluation Platform - User Guide, UG226 (v1.4), August 24 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., Wójcik, M. (2012). Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. In: Chen, L., Yung, M., Zhu, L. (eds) Trusted Systems. INTRUST 2011. Lecture Notes in Computer Science, vol 7222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32298-3_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32297-6

  • Online ISBN: 978-3-642-32298-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics