How to Retrieve PUF Response from a Fabricated Chip Securely?

Physical unclonable function (PUF) has been widely applied as a security primitive in multiple authentication schemes. It is usually adopted in the chip design and used to generate a unique key to authenticate one with key to operate the design normally. PUF responses hence need to be retrieved in a secure way rather than be accessible to anyone. To highlight the importance of this issue, we first identify the scenarios where secure retrieval of PUF response is necessary. We then propose the principle to retrieve the PUF-based key in a secure way and discuss the evaluation criteria. We survey, classify and evaluate the existing work on this issue and analyze the advantages and disadvantages of each scheme. Suggestions are finally given for the designers to select appropriate retrieval scheme in a specific hardware design.

[1]  S. Rocchi,et al.  Power analysis attacks to cryptographic circuits: a comparative analysis of DPA and CPA , 2008, 2008 International Conference on Microelectronics.

[2]  Jarrod A. Roy,et al.  EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.

[3]  D. Engels,et al.  Security and Privacy : Modest Proposals for Low-Cost RFID Systems # , 2004 .

[4]  Joseph Zambreno,et al.  Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.

[5]  Chip-Hong Chang,et al.  A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips , 2019, IEEE Transactions on Emerging Topics in Computing.

[6]  Chip-Hong Chang,et al.  A Retrospective and a Look Forward: Fifteen Years of Physical Unclonable Function Advancement , 2017, IEEE Circuits and Systems Magazine.

[7]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[8]  Myron J. Rand Reliability of LSI Memory Circuits Exposed to Laser Cutting , 1979, 17th International Reliability Physics Symposium.

[9]  Gang Qu,et al.  A New Scheme to Extract PUF Information by Scan Chain , 2018, 2018 IEEE 27th Asian Test Symposium (ATS).

[10]  Anupam Chattopadhyay,et al.  Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013 , 2014, INDOCRYPT.

[11]  Gang Qu,et al.  A New Active IC Metering Technique Based on Locking Scan Cells , 2017, 2017 IEEE 26th Asian Test Symposium (ATS).

[12]  John Lach,et al.  IC activation and user authentication for security-sensitive systems , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[13]  Maurizio Pizzonia,et al.  Efficient and practical authentication of PUF-based RFID tags in supply chains , 2010, 2010 IEEE International Conference on RFID-Technology and Applications.

[14]  Jarrod A. Roy,et al.  Protecting bus-based hardware IP by secret sharing , 2008, 2008 45th ACM/IEEE Design Automation Conference.

[15]  Gang Qu,et al.  A Secure and Low-overhead Active IC Metering Scheme , 2019, 2019 IEEE 37th VLSI Test Symposium (VTS).

[16]  Aijiao Cui,et al.  A New Pay-Per-Use Scheme for the Protection of FPGA IP , 2019, 2019 IEEE International Symposium on Circuits and Systems (ISCAS).

[17]  Jarrod A. Roy,et al.  Ending Piracy of Integrated Circuits , 2010, Computer.