Physically Unclonable and Reconfigurable Computing System (PURCS) for Hardware Security Applications

A physically unclonable and reconfigurable computing system is introduced which provides both logic locking and authentication of devices. A chaotic oscillator is required to generate the chaotic signals and can produce different Boolean functions using different tuning parameters, including a control bit, iteration number, threshold voltage, and bifurcation parameter. The aim of this article is to build a hybrid computing system with the mixed implementation of standard logic gates and reconfigurable chaos-based logic gates. The tuning parameters of the oscillator make up the secret key for logic locking. Process variation due to fabrication can be leveraged to generate unique keys for each chip. The whole computing system exhibits physical unclonable function (PUF) characteristics and can be used to generate challenge–response pairs (CRPs) for authenticating devices. We have used ISCAS’85 combinational benchmark circuits to demonstrate the results. The Hamming distance between correct and wrong outputs is calculated to ensure that 50% of the output bits are flipped when the wrong key is applied. A Boolean SAT attack has been carried out on the system and it displays exponential complexity with an increase in the total number of chaos gates and key size of each chaos gate. The hybrid system demonstrates near-ideal PUF metrics, including uniqueness, uniformity, and bit aliasing. Common machine learning attacks have been executed on the CRPs generated from the whole system and results show that the proposed chaos-based PUF is robust against modeling attacks. The hybrid system has significantly less overhead compared to traditional systems containing both logic locking and PUF circuitry.

[1]  Ramesh Karri,et al.  Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices , 2018, IEEE Transactions on Emerging Topics in Computing.

[2]  Garrett S. Rose,et al.  A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering , 2019, Journal of Hardware and Systems Security.

[3]  Jeyavijayan Rajendran,et al.  A Disquisition on Logic Locking , 2019 .

[4]  Garrett S. Rose,et al.  Design for Eliminating Operation Specific Power Signatures from Digital Logic , 2019, ACM Great Lakes Symposium on VLSI.

[5]  Ozgur Sinanoglu,et al.  Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) – Unlocked , 2019, IEEE Transactions on Information Forensics and Security.

[6]  Piotr Z. Wieczorek,et al.  Chaos-Based Physical Unclonable Functions , 2019, Applied Sciences.

[7]  Ankur Srivastava,et al.  Anti-SAT: Mitigating SAT Attack on Logic Locking , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[8]  Garrett S. Rose,et al.  Design of a Reconfigurable Chaos Gate with Enhanced Functionality Space in 65nm CMOS , 2018, 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS).

[9]  Makoto Nagata,et al.  Supply-Chain Security Enhancement by Chaotic Wireless Chip-Package-Board Interactive PUF , 2018, 2018 IEEE 68th Electronic Components and Technology Conference (ECTC).

[10]  Avesta Sasan,et al.  LUT-Lock: A Novel LUT-Based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection , 2018, 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).

[11]  Avesta Sasan,et al.  SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware , 2018, ACM Great Lakes Symposium on VLSI.

[12]  Garrett S. Rose,et al.  Chaos computing for mitigating side channel attack , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[13]  Takashi Sato,et al.  Ising-PUF: A machine learning attack resistant PUF featuring lattice like arrangement of Arbiter-PUFs , 2018, 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[14]  Hai Zhou,et al.  Double DIP: Re-Evaluating Security of Logic Encryption Algorithms , 2017, ACM Great Lakes Symposium on VLSI.

[15]  Meng Li,et al.  AppSAT: Approximately deobfuscating integrated circuits , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[16]  Garrett S. Rose,et al.  Robustness Analysis of a Memristive Crossbar PUF Against Modeling Attacks , 2017, IEEE Transactions on Nanotechnology.

[17]  Ramesh Karri,et al.  On Improving the Security of Logic Locking , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[18]  Taner Tuncer The implementation of chaos-based PUF designs in field programmable gate array , 2016 .

[19]  Yici Cai,et al.  Secure and low-overhead circuit obfuscation technique with multiplexers , 2016, 2016 International Great Lakes Symposium on VLSI (GLSVLSI).

[20]  Ozgur Sinanoglu,et al.  SARLock: SAT attack resistant logic locking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[21]  Behnam Kia,et al.  A Simple Nonlinear Circuit Contains an Infinite Number of Functions , 2016, IEEE Transactions on Circuits and Systems II: Express Briefs.

[22]  Michael Segal,et al.  Optical PUF for Non Forwardable Vehicle Authentication , 2015, 2015 IEEE 14th International Symposium on Network Computing and Applications.

[23]  Behnam Kia,et al.  Nonlinear dynamics based digital logic and circuits , 2015, Front. Comput. Neurosci..

[24]  Sayak Ray,et al.  Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[25]  Igor L. Markov,et al.  Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[26]  Jeyavijayan Rajendran,et al.  Fault Analysis-Based Logic Encryption , 2015, IEEE Transactions on Computers.

[27]  Mark Mohammad Tehranipoor,et al.  Advanced Analysis of Cell Stability for Reliable SRAM PUFs , 2014, 2014 IEEE 23rd Asian Test Symposium.

[28]  Garrett S. Rose A Chaos-Based Arithmetic Logic Unit and Implications for Obfuscation , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.

[29]  Brandon Wang,et al.  Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[30]  Jeyavijayan Rajendran,et al.  VLSI testing based security metric for IC camouflaging , 2013, 2013 IEEE International Test Conference (ITC).

[31]  Jean-Pierre Seifert,et al.  Breaking and entering through the silicon , 2013, CCS.

[32]  Jeyavijayan Rajendran,et al.  Security analysis of integrated circuit camouflaging , 2013, CCS.

[33]  Subramanian S. Iyer,et al.  A Self-Authenticating Chip Architecture Using an Intrinsic Fingerprint of Embedded DRAM , 2013, IEEE Journal of Solid-State Circuits.

[34]  Ahmad-Reza Sadeghi,et al.  Memristor PUFs: A new generation of memory-based Physically Unclonable Functions , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[35]  Jeyavijayan Rajendran,et al.  Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[36]  Jeyavijayan Rajendran,et al.  Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.

[37]  Jeyavijayan Rajendran,et al.  Logic encryption: A fault analysis perspective , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[38]  Ingrid Verbauwhede,et al.  Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs , 2012, CT-RSA.

[39]  G. Edward Suh,et al.  Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations , 2011, TRUST.

[40]  Farinaz Koushanfar,et al.  Integrated circuits metering for piracy protection and digital rights management: an overview , 2011, GLSVLSI '11.

[41]  Abhranil Maiti,et al.  Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive , 2011, Journal of Cryptology.

[42]  Sudeshna Sinha,et al.  Chaogates: morphing logic gates that exploit dynamical patterns. , 2010, Chaos.

[43]  Patrick Schaumont,et al.  An Analysis of Delay Based PUF Implementations on FPGA , 2010, ARC.

[44]  Joseph Zambreno,et al.  Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.

[45]  Dhruva Acharyya,et al.  A physical unclonable function defined using power distribution system equivalent resistance variations , 2009, 2009 46th ACM/IEEE Design Automation Conference.

[46]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[47]  Jarrod A. Roy,et al.  EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.

[48]  Sudeshna Sinha,et al.  Chaos computing: ideas and implementations , 2007, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[49]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[50]  P. Dudek,et al.  Integrated Circuit Implementation of a Compact Discrete-Time Chaos Generator , 2006 .

[51]  Piotr Dudek,et al.  Compact discrete-time chaos generator circuit , 2003 .

[52]  William L. Ditto,et al.  Implementation of nor Gate by a Chaotic Chua's Circuit , 2003, Int. J. Bifurc. Chaos.

[53]  William L. Ditto,et al.  Chaos computing: implementation of fundamental logical gates by chaotic elements , 2002 .

[54]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[55]  Miodrag Potkonjak,et al.  Constraint-based watermarking techniques for design IP protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[56]  Gang Qu,et al.  Hardware metering , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).

[57]  William L. Ditto,et al.  DYNAMICS BASED COMPUTATION , 1998 .

[58]  Edoardo Charbon Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).