Physical Unclonable Functions (PUFs) leverage manufacturing process imperfections that cause propagation delay discrepancies for the signals traveling along these paths. While PUFs can be used for device authentication and chip-specific key generation, strong PUFs have been shown to be vulnerable to machine learning modeling attacks. Although there is an impression that combinational circuits must be designed without any loops, cyclic combinational circuits have been shown to increase design security against hardware intellectual property theft. In this paper, we introduce feedback signals into traditional delay-based PUF designs such as arbiter PUF, ring oscillator PUF, and butterfly PUF to give them a wider range of possible output behaviors and thus an edge against modeling attacks. Based on our analysis, cyclic PUFs produce responses that can be binary, steady-state, oscillating, or pseudo-random under fixed challenges. The proposed cyclic PUFs are implemented in field programmable gate arrays, and their power and area overhead, in addition to functional metrics, are reported compared with their traditional counterparts. The security gain of the proposed cyclic PUFs is also shown against state-of-the-art attacks.
more »
« less
Fortified-Edge 4.0: A ML-Based Error Correction Framework for Secure Authentication in Collaborative Edge Computing
Physical Unclonable Functions (PUFs) are widely researched in the field of security because of their unique, robust, and reliable nature, PUFs are considered device-specific root keys that are hard to duplicate. There are many variants of PUFs that are being studied and implemented including hardware and software PUFs. Though PUFs are believed to be secure and reliable, they are not without challenges of their own. The efficient performance of PUF depends on various environmental factors, which leads to inefficiency. Bit flipping is one such problem that can bring down the reliability of the PUF. Memory-based PUFs are prone to unavoidable bit flips occurring in the hardware, similarly, sensor-based PUFs are prone to bit flips occurring due to temperature variation. The number of errors in the PUF response must be minimized to improve the reliability of the PUF in security applications. In this research we explore the Machine Learning (ML) model based on K-mer sequencing to detect and correct the bit flips in the PUFs, hence fortifying the PUF-based secure authentication system for authentication and authorization of Edge Data Centers (EDC) in a Collaborative Edge Computing (CEC) Environment.
more »
« less
- Award ID(s):
- 2101181
- PAR ID:
- 10581948
- Publisher / Repository:
- ACM
- Date Published:
- ISSN:
- 979-8-4007-0605-9/24/06
- ISBN:
- 9798400706059
- Page Range / eLocation ID:
- 639 to 644
- Subject(s) / Keyword(s):
- Collaborative Edge Computing (CEC), Cybersecurity, Security-by-Design (SbD), Hardware Assisted Security (HAS), Physical Unclonable Functions (PUF), Machine Learning (ML), Error Detection, Error Correction
- Format(s):
- Medium: X
- Location:
- Clearwater FL USA
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Physically Unclonable Functions (PUFs) have become an important and promising hardware primitive for device fingerprinting, device identification, or key storage. Intrinsic PUFs leverage components already found in existing devices, unlike extrinsic silicon PUFs, which are based on customized circuits that involve modification of hardware. In this work, we present a new type of a memory-based intrinsic PUF, which leverages the Rowhammer effect in DRAM modules - the Rowhammer PUF. Our PUF makes use of bit flips, which occur in DRAM cells due to rapid and repeated access of DRAM rows. Prior research has mainly focused on Rowhammer attacks, where the Rowhammer effect is used to illegitimately alter data stored in memory, e.g., to change page table entries or enable privilege escalation attacks. Meanwhile, this is the first work to use the Rowhammer effect in a positive context - to design a novel PUF. We extensively evaluate the Rowhammer PUF using commercial, off-the-shelf devices, not relying on custom hardware or an FPGA-based setup. The evaluation shows that the Rowhammer PUF holds required properties needed for the envisioned security applications, and could be deployed today.more » « less
-
null (Ed.)Physically Unclonable Functions (PUFs) are emerging hardware security primitives that leverage random variations during chip manufacturing process to generate unique secrets. The security level of generated PUF secrets is mainly determined by its unpredictability feature which is typically evaluated using the metric of entropy bits. In this paper, we propose a novel Pairwise Distinct-Modulus (PDM) technique that significantly improves the upper bound of PUF entropy bits from the scale of log2(N!) up to O(N^2). The PDM technique boosts entropy by eliminating the correlation within PUF response bits caused by element reuse in conventional pairwise comparison. We also propose a reliability-enhancing scheme to compensate the impact on reducing reliability by saving a significant portion of potential reliable response bits. Experimental results based on a published large-scale RO PUF frequency dataset validated that the proposed technique significantly boosts PUF entropy bits from the scale of O(N∙log2(N)) up to approach the new upper bound of O(N^2) with a comparable reliability, and the reliability-enhancing technique saves 4x more on the percentage of reliable response bits.more » « less
-
Abstract A Physical Unclonable Function (PUF) is a security primitive that exploits inherent variations in manufacturing protocols to generate unique, random‐like identifiers. These identifiers are used for authentication and encryption purposes in hardware security applications in the semiconductor industry. Inspired by the success of silicon PUFs, herein it is leverage Terminal deoxynucleotidyl Transferase (TdT), a template‐independent polymerase belonging to the X‐family of DNA polymerases, to augment the intrinsic entropy generated during DNA lesion repair and rapidly produce genetic PUFs that satisfy the following properties: robustness (i.e., they repeatedly produce the same output), uniqueness (i.e., they do not coincide with any other identically produced PUF), and unclonability (i.e., they are virtually impossible to replicate). Furthermore, a post‐sequencing feature selection methodology based on logistic regression to facilitate PUF classification is developed. This experimental and computational pipeline drastically reduces production time and cost compared to conventional genetic barcoding without compromising the stringent PUF criteria of uniqueness and unclonability. This results provide novel insights into the function of TdT and represent a major step toward utilization of PUFs as a biosecurity primitive for cell line authentication and provenance attestation.more » « less
-
Abstract With the fast growth of the number of electronic devices on the internet of things (IoT), hardware‐based security primitives such as physically unclonable functions (PUFs) have emerged to overcome the shortcomings of conventional software‐based cryptographic technology. Existing PUFs exploit manufacturing process variations in a semiconductor foundry technology. This results in a static challenge–response behavior, which can present a long‐term security risk. This study shows a reconfigurable PUF based on nanoscale magnetic tunnel junction (MTJ) arrays that uses stochastic dynamics induced by voltage‐controlled magnetic anisotropy (VCMA) for true random bit generation. A total of 100 PUF instances are implemented using 10 ns voltage pulses on a single chip with a 10 × 10 MTJ array. The unipolar nature of the VCMA mechanism is exploited to stabilize the MTJ state and eliminate bit errors during readout. All PUF instances show entropy close to one, inter‐Hamming distance close to 50%, and no bit errors in 104repeated readout measurements.more » « less
An official website of the United States government

