Enhancing TPM Security by Integrating SRAM PUFs Technology

This paper presents an approach for enhancing the security of key hierarchy in the Trusted Platform Module (TPM) by utilizing the Static Random Access Memory (SRAM) based Physical Unclonable Functions (PUFs) technology and shows that it can make TPM's Endorsement Key extraction attacks extremely hard. We also provide a plan that implements our SRAM PUFs + TPM integration design in a normal TPM scheme and evaluate our plan. Finally, we demonstrate that our implementation is lightweight due to its minimum change to the existing TPM scheme and also relatively low-cost comparing to those traditional tamper resistance circuitry.

[1]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[2]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[3]  Mohammad Tehranipoor,et al.  Physical Attacks and Tamper Resistance , 2012 .

[4]  Pim Tuyls,et al.  Anti-counterfeiting with hardware intrinsic security , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[5]  Jean-Pierre Seifert,et al.  Cloning Physically Unclonable Functions , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[6]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[7]  Ingrid Verbauwhede,et al.  A soft decision helper data algorithm for SRAM PUFs , 2009, 2009 IEEE International Symposium on Information Theory.

[8]  Ingrid Verbauwhede,et al.  Intrinsic PUFs from Flip-flops on Reconfigurable Devices , 2008 .

[9]  María Iluminada Baturone Castillo,et al.  Using physical unclonable functions for hardware authentication: a survey , 2010 .

[10]  Helena Handschuh,et al.  Hardware Intrinsic Security from Physically Unclonable Functions , 2010, Towards Hardware-Intrinsic Security.

[11]  Jorge Guajardo,et al.  Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[12]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[13]  R. Pappu,et al.  Physical One-Way Functions , 2002, Science.

[14]  Ying Su,et al.  A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit using Process Variations , 2007, 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers.

[15]  Patrick Schaumont,et al.  The Impact of Aging on an FPGA-Based Physical Unclonable Function , 2011, 2011 21st International Conference on Field Programmable Logic and Applications.

[16]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[17]  Marten van Dijk,et al.  A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).

[18]  Allan Tomlinson Introduction to the TPM , 2008 .

[19]  Mikhail J. Atallah,et al.  Robust Authentication Using Physically Unclonable Functions , 2009, ISC.

[20]  Ingrid Verbauwhede,et al.  Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.

[21]  Thomas Morris,et al.  Trusted Platform Module , 2011, Encyclopedia of Cryptography and Security.

[22]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[23]  Hugo Krawczyk,et al.  Leftover Hash Lemma, Revisited , 2011, IACR Cryptol. ePrint Arch..

[24]  Peter Simons,et al.  Buskeeper PUFs, a promising alternative to D Flip-Flop PUFs , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.

[25]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.