A practical proposal for ensuring the provenance of hardware devices and their safe operation

This paper presents a novel technique, termed ICmetrics (Integrated Circuit metrics), that can be used for the purposes of generating encryption keys, electronic signatures, detecting attempts of frauds, or preventing malfunction of hardware components and systems. The ICmetrics technology is based on employment of measurable features derived from characteristics of a given electronic device in order to generate an identifier that uniquely determines or describes the device. Any changes in the identifier during consequent device's operation would signal about a possible safety or security breach within the electronic system. After a detailed overview of the ICmetrics technology and comparing it to the alternative techniques commonly used for securing electronic systems, the paper discusses challenges of developing the technology and brings an example to demonstrate how these issues are being addressed.

[1]  W. Gareth J. Howells,et al.  Consensus fingerprint matching with genetically optimised approach , 2009, Pattern Recognit..

[2]  Helena Handschuh,et al.  Hardware Intrinsic Security from Physically Unclonable Functions , 2010, Towards Hardware-Intrinsic Security.

[3]  Weiguo Sheng,et al.  Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering , 2008, IEEE Transactions on Information Forensics and Security.

[4]  Mohammed Yakoob Siyal,et al.  Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..

[5]  Weiguo Sheng,et al.  A Memetic Fingerprint Matching Algorithm , 2007, IEEE Transactions on Information Forensics and Security.

[6]  Geof H. Givens,et al.  Consistency of the local kernel density estimator , 1995 .

[7]  John Daugman,et al.  Biometric decision landscapes , 2000 .

[8]  Gareth Howells,et al.  Integrating Multi-Modal Circuit Features within an Efficient Encryption System , 2007 .

[9]  Trevor Mudge,et al.  MiBench: A free, commercially representative embedded benchmark suite , 2001 .

[10]  Farzin Deravi,et al.  Feasibility of generating biometric encryption keys , 2005 .

[11]  Dongbing Gu,et al.  ICmetrics for Low Resource Embedded Systems , 2012, 2012 Third International Conference on Emerging Security Technologies.

[12]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[13]  Naohisa Komatsu,et al.  A secure communication system using biometric identity verification (マルチメディア情報処理,映像表現,ネットワーク映像メディア,画像情報システム第3回International Workshop on Advanced Image Technology(IWAIT2001)) , 2000 .

[14]  G. Howells,et al.  A Peak-Trough Detection Algorithm Based on Momentum , 2008, 2008 Congress on Image and Signal Processing.