Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †
Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic protocols. However, as recent work has demonstrated, the times needed in order to generate th...
Main Authors: | , , , , , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-06-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | http://www.mdpi.com/2410-387X/2/3/13 |
id |
doaj-0c91456ce685460a9901484afea492dc |
---|---|
record_format |
Article |
spelling |
doaj-0c91456ce685460a9901484afea492dc2020-11-24T22:13:26ZengMDPI AGCryptography2410-387X2018-06-01231310.3390/cryptography2030013cryptography2030013Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †Nikolaos Athanasios Anagnostopoulos0Tolga Arul1Yufan Fan2Christian Hatzfeld3André Schaller4Wenjie Xiong5Manishkumar Jain6Muhammad Umair Saleem7Jan Lotichius8Sebastian Gabmeyer9Jakub Szefer10Stefan Katzenbeisser11Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, GermanySecurity Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, GermanyDepartment of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, GermanyMeasurement and Sensor Technology, Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, GermanySecurity Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, GermanyComputer Architecture and Security Laboratory, Department of Electrical Engineering, Yale University, 10 Hillhouse Avenue, New Haven, CT 06520, USADepartment of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, GermanyDepartment of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, GermanyMeasurement and Sensor Technology, Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, GermanySecurity Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, GermanyComputer Architecture and Security Laboratory, Department of Electrical Engineering, Yale University, 10 Hillhouse Avenue, New Haven, CT 06520, USASecurity Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, GermanyPhysical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic protocols. However, as recent work has demonstrated, the times needed in order to generate their responses may prohibit their widespread usage. To address this issue, the Row Hammer PUF has been proposed by Schaller et al., which leverages the row hammer effect in DRAM modules to reduce the retention times of their cells and, therefore, significantly speed up the generation times for the responses of PUFs based on these retention times. In this work, we extend the work of Schaller et al. by presenting a run-time accessible implementation of this PUF and by further reducing the time required for the generation of its responses. Additionally, we also provide a more thorough investigation of the effects of temperature variations on the Row Hammer PUF and briefly discuss potential statistical relationships between the cells used to implement it. As our results prove, the Row Hammer PUF could potentially provide an adequate level of security for Commercial Off-The-Shelf (COTS) devices, if its dependency on temperature is mitigated, and, may therefore, be commercially adopted in the near future.http://www.mdpi.com/2410-387X/2/3/13row hammerdynamic random access memory (DRAM)physical unclonable function (PUF)run-time accessiblesecurity primitive |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Nikolaos Athanasios Anagnostopoulos Tolga Arul Yufan Fan Christian Hatzfeld André Schaller Wenjie Xiong Manishkumar Jain Muhammad Umair Saleem Jan Lotichius Sebastian Gabmeyer Jakub Szefer Stefan Katzenbeisser |
spellingShingle |
Nikolaos Athanasios Anagnostopoulos Tolga Arul Yufan Fan Christian Hatzfeld André Schaller Wenjie Xiong Manishkumar Jain Muhammad Umair Saleem Jan Lotichius Sebastian Gabmeyer Jakub Szefer Stefan Katzenbeisser Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security † Cryptography row hammer dynamic random access memory (DRAM) physical unclonable function (PUF) run-time accessible security primitive |
author_facet |
Nikolaos Athanasios Anagnostopoulos Tolga Arul Yufan Fan Christian Hatzfeld André Schaller Wenjie Xiong Manishkumar Jain Muhammad Umair Saleem Jan Lotichius Sebastian Gabmeyer Jakub Szefer Stefan Katzenbeisser |
author_sort |
Nikolaos Athanasios Anagnostopoulos |
title |
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security † |
title_short |
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security † |
title_full |
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security † |
title_fullStr |
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security † |
title_full_unstemmed |
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security † |
title_sort |
intrinsic run-time row hammer pufs: leveraging the row hammer effect for run-time cryptography and improved security † |
publisher |
MDPI AG |
series |
Cryptography |
issn |
2410-387X |
publishDate |
2018-06-01 |
description |
Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic protocols. However, as recent work has demonstrated, the times needed in order to generate their responses may prohibit their widespread usage. To address this issue, the Row Hammer PUF has been proposed by Schaller et al., which leverages the row hammer effect in DRAM modules to reduce the retention times of their cells and, therefore, significantly speed up the generation times for the responses of PUFs based on these retention times. In this work, we extend the work of Schaller et al. by presenting a run-time accessible implementation of this PUF and by further reducing the time required for the generation of its responses. Additionally, we also provide a more thorough investigation of the effects of temperature variations on the Row Hammer PUF and briefly discuss potential statistical relationships between the cells used to implement it. As our results prove, the Row Hammer PUF could potentially provide an adequate level of security for Commercial Off-The-Shelf (COTS) devices, if its dependency on temperature is mitigated, and, may therefore, be commercially adopted in the near future. |
topic |
row hammer dynamic random access memory (DRAM) physical unclonable function (PUF) run-time accessible security primitive |
url |
http://www.mdpi.com/2410-387X/2/3/13 |
work_keys_str_mv |
AT nikolaosathanasiosanagnostopoulos intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT tolgaarul intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT yufanfan intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT christianhatzfeld intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT andreschaller intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT wenjiexiong intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT manishkumarjain intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT muhammadumairsaleem intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT janlotichius intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT sebastiangabmeyer intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT jakubszefer intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity AT stefankatzenbeisser intrinsicruntimerowhammerpufsleveragingtherowhammereffectforruntimecryptographyandimprovedsecurity |
_version_ |
1725801014136668160 |