A noise bifurcation architecture for linear additive physical functions

Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. Popular realizations use linear additive functions as building blocks. Security is scaled up using non-linear mixing (e.g., adding XORs). Becaus...

Full description

Bibliographic Details
Main Authors: Yu, Meng-Day (Author), M'Raihi, David (Author), Verbauwhede, Ingrid (Author), Devadas, Srinivas (Contributor)
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE), 2015-11-23T17:24:18Z.
Subjects:
Online Access:Get fulltext
LEADER 02126 am a22002053u 4500
001 100005
042 |a dc 
100 1 0 |a Yu, Meng-Day  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science  |e contributor 
100 1 0 |a Devadas, Srinivas  |e contributor 
700 1 0 |a M'Raihi, David  |e author 
700 1 0 |a Verbauwhede, Ingrid  |e author 
700 1 0 |a Devadas, Srinivas  |e author 
245 0 0 |a A noise bifurcation architecture for linear additive physical functions 
260 |b Institute of Electrical and Electronics Engineers (IEEE),   |c 2015-11-23T17:24:18Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/100005 
520 |a Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. Popular realizations use linear additive functions as building blocks. Security is scaled up using non-linear mixing (e.g., adding XORs). Because the responses are physically derived and thus noisy, the resulting explosion in noise impacts both the adversary (which is desirable) as well as the verifier (which is undesirable). We present the first architecture for linear additive physical functions where the noise seen by the adversary and the noise seen by the verifier are bifurcated by using a randomized decimation technique and a novel response recovery method at an authentication verification server. We allow the adversary's noise η[subscript a] → 0.50 while keeping the verifier's noise η[subscript v] constant, using a parameter-based authentication modality that does not require explicit challenge/response pair storage at the server. We present supporting data using 28nm FPGA PUF noise results as well as machine learning attack results. We demonstrate that our architecture can also withstand recent side-channel attacks that filter the noise (to clean up training challenge/response labels) prior to machine learning. 
546 |a en_US 
655 7 |a Article 
773 |t Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)