PUF Based Hardware Security A Review
PUF Based Hardware Security A Review
Authorized licensed use limited to: National Tsing Hua Univ.. Downloaded on June 27,2023 at 06:37:02 UTC from IEEE Xplore. Restrictions apply.
B. Strong versus Weak PUFs B. Prevention of Hardware Trojan using PE-PUF
There are two types of PUF based on the size of the The shortcomings of only Delay Based PUF get rectified in
Challenge-Response pair (CRP). These are Strong PUF and [2] PE-PUF. A PE-PUF enhances the randomness and
Weak PUF. uniqueness of the signature as it imbibes both process and
environmental variations, such as temperature, power supply
With only a limited CRP space, Weak PUF store less number noise and crosstalk.
of output and in extreme cases may store only a single output.
They are mainly used for seeding a pseudo random number
generator, where the response is used internally as and when Oscillation frequency of a ring oscillator with Ninv inverters,
required. denoted by fos, varies according to the equation
III. REVIEW ON PUF-BASED HARDWARE SECURITY In their paper, they have used a 7-inverter ring oscillator with
two nearby interconnects as described in Fig 2. They have
used HSPICE and done in 90mm technology.
A. Review on PUF based prevention of Hardware Trojan
Paper [1] describes a simple example of Silicon PUF is Ring –
As the chip size is shrinking day by day, the randomness that
Oscillator PUF where the oscillator contains an odd number of
gets incorporated into the circuit during the manufacturing
gates. Fig:1 . describes a simple ring oscillator where 3 NOT
process are not easily understood. It results in unpredictable
gates are connected in series and a feedback loop is given. The
unit resistance, capacitance and inductance. If we apply the
output will oscillate after we enable the circuit.
same input pattern to different chips then it will show different
effects of temperature, voltage and cross talk.
Here
f = frequency of ring oscillator; This PUF is quite resistant to power side channel attack
n = number of stages; because the three inverters are spread across the whole die.
t = time delay of each stages Fig. 3 shows the power trace of both the PE-PUF, which is
shown by solid line and the only PUF shown by the dashed
Here the frequency is affected by the process variance. line. Comparing, we observe that the oscillation frequency
Delay-based PUF generates unique signatures by imbibing information is not getting exposed through the power trace in
only the process variation but there are some shortcomings case of PE-PUF. Besides in case of PE-PUF the oscillation
due to spatial correlation among the process parameters. So, frequency depends on the input pattern, which is known only
these PUFs are vulnerable as they can be broken by side to designer.
channel attacks and also, they have less uniqueness in their
signatures.
Authorized licensed use limited to: National Tsing Hua Univ.. Downloaded on June 27,2023 at 06:37:02 UTC from IEEE Xplore. Restrictions apply.
in [2] and by erasing one of the CRPs by use of Memristors as
in [3].
Authorized licensed use limited to: National Tsing Hua Univ.. Downloaded on June 27,2023 at 06:37:02 UTC from IEEE Xplore. Restrictions apply.
However, till now, these designs are simulated for ASICs only [6]. Kernels are inner mapping functions on which the
and they are not suitable for FPGAs. Moreover in hardware learning of the support vector machine is dependent.
level the voltage range of the input is fixed so that the
memristor state becomes 1. Any changes made in this value iii) Neural Networks – Our brain contains numerous connected
will be noted and sent to the authenticate side that some neurons that form a network known as neural network. A
unusual is happening. replica of the same network when made using algorithm forms
out Artificial Neural Network or ANN. Each node is
Thus the double security of this design is unique. But like composed of neurons, which help in providing the
other PUF designs it might be tested with various ML computational ability to ANN, and is arranged in the layers
algorithms. [7,8].
Authorized licensed use limited to: National Tsing Hua Univ.. Downloaded on June 27,2023 at 06:37:02 UTC from IEEE Xplore. Restrictions apply.
minimizes the variance and over-fitting thus producing a more XORed with an n-bit challenge and their output is fed as
accurate model. challenge to the Strong PUF.
ii) Boosting - Comparing it with the bagging, it does not have A new PUF ID Generator is proposed in this paper which is
much difference except the fact that here the homogeneous both lightweight and reliable and is named here as Pico-PUF.
weak learning models are run sequentially and not in parallel. This Pico-PUF is utilized to show the feasibility of the MPUF.
During each iteration the data is analyzed, the misclassified 100% reliability is achieved by this design. In general, any
data points are allocated greater weights and correct are given Strong PUF like the Arbiter PUF etc. can be utilized to design
less weight. The new classifier thus formed will learn from the the MPUF.
previously misclassified data. With each iteration, the final
classifier gets stronger gives accurate prediction. Two variants Here we come across a new machine learning technique called
of this method are Adaptive Boosting (AdaBoost) and the CMAES. The reliability based CMAES attack, is the most
Gradient Boosting. effective modeling attack against PUFs. It uses repeated
measurements for the same challenge to analyze the reliability
iii) Stacking – Just as the bagging algorithm it runs the of the response bits and then feeds this observation into a
learning model in parallel but the learning model are not fitness function to find the ‘best-fit’ delay parameters.
homogenous here.
iv) Evolutionary Algorithms (EA) – In this work, the authors IV. C ONCLUSION
have utilized Genetic Algorithm to attack the PUF. There are
also other works, which shows the attack of Evolutionary Throughout the survey we have tried to show the timeline of
Algorithm based model attacks. As a solution an EA gives the research that has happened in the field of Hardware
output as a real number set. Since, Genetic Algorithm (GA) Security using PUF. We have tried to compare the merits and
[13] works well with binary strings and integer data, GA goes demerits of some models. There are also some newly proposed
handy in implementing the CRP data. Just EA concept is PUF models like Symmetric Function Based Memristive
similar to concepts like reproduction, recombination/crossover Polimino PUF [10], which uses a different approach to
and selection. In this work, an open-source toolkit, Pyevolve is enhance the security. With the advent of machine learning
used for experiments. attacks, some of the previously made models were broken. We
came across endeavors that tried to overcome it but as
According to this paper, a Cascaded structure based Strong machine learning algorithms progresses, our PUF needs to be
PUF is immune to known machine learning attacks. This stronger. Finally, we land upon a final model i.e., MPUF that
paper shows the characteristics and functions that the cascaded is resistant to these attacks. It is also observed that Genetic
block must possess in order to be resistant to machine learning Algorithm (GA) based method has better prediction rate in
attacks. It does not go into the implementation detail of the comparison with other reported methods.
circuit design, which is left for the purview of the circuit
designer. It paved the path for systematic design approach. The final design is a MPUF created using a Pico-PUF and an
APUF. To test the resistance of the design against Machine
Learning Attacks, they used two separate attacks. One is the
G. Multi-PUF
CMA-ES attack and the other is the LR attack. When the LR
As research in this field progresses, it is shown that both the attack is done, the MPUF achieves a prediction rate of only
lightweight Arbiter PUF [4] and XOR based PUF[3] have also 50% but it is 100% for the traditional Arbiter PUF. Using
been broken with a considerable number of CRPs . To get rid CMA-ES, the MPUF design shows a prediction rate of around
of this, this paper introduces a new non-linear PUF which is 80% with a sample set of 10,000 CRPs and challenge size of
composed of current mirror and based on Voltage Transfer 32 bits. For traditional PUF, it achieves 100% prediction rate.
Characteristics. However, till now, these designs are simulated For smaller challenge size also, it also shows better results
for ASICs only and they are not suitable for FPGAs. than the traditional Arbiter PUF.
Authorized licensed use limited to: National Tsing Hua Univ.. Downloaded on June 27,2023 at 06:37:02 UTC from IEEE Xplore. Restrictions apply.
[3] Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Symposium on Hardware-Oriented Security and Trust HOST’14,
Wayne Burleson, Omid Kavehei, Marten van Dijk, Damith C. Arlington, VA, USA, pp. 38–43, 2014.
Ranasinghe and Ulrich Rührmair, “Efficient Erasable PUFs from [9] S. Basu, M. Kule, “Detection Of Hardware Trojan In Memristive
Programmable Logic and Memristors,” ACR Cryptol. ePrint Arch , Ternary CAM Circuits,” International Symposium on Devices,
2018 . Circuits and Systems (ISDCS), pp. 1-5, 2020.
[4] Sharad Kumar and Mohammed Niamat, “Machine Learning based [10] Subhashree Basu, Malay Kule, Hafizur Rahaman, “Symmetric
Modeling Attacks on a Configurable PUF,” IEEE National Aerospace Function Based Memristive Polimino PUF with Enhanced Security,”
and Electronics Conference NAECON 2018 IEEE International Symposium on Smart Electronic Systems (iSES)
[5] Arunkumar Vijayakumar, Vinay C. Patil, Charles B. Prado and Sandip 2020, pp. 154-157, 2020
Kundu, “Machine Learning Resistant Strong PUF: Possible or a Pipe [11] Yildiran Yilmaz, Steve R. Gunn, Basel Halak, “Lightweight PUF-
Dream?,” IEEE International Symposium on Hardware Oriented Based Authentication Protocol for IoT Devices,” Electronics and
Security and Trust (HOST) 2016 Computer Science, University of Southampton, United Kingdom,
[6] Qingqing Ma, Chongyan Gu, Neil Hanle, Chenghua Wang, Weiqiang IEEE, 2018
Liu, M´aire O’Neill, “A Machine Learning Attack Resistant Multi- [12] Atul Kahate, “Cryptography and Network Security,” McGrawHill
PUF Design on FPGA,” 23rd Asia and South Pacific Design Education.
Automation Conference (ASP-DAC) 2018.
[13] David E.Goldberg, “Genetic Algorithm in Search, Optimization and
[7] A. Vijayakumar and S. Kundu, “A novel modelingattack resistant Machine Learning,” Addison-Wesley Longman Publishing Co.
PUF design based on nonlinear voltage transfer characteristics,” in
Proc. Design, Automation And Test in Europe Conference And [14] Alireza Shamsoshoara , Ashwija Korenda ,Fatemeh Afghah , Sherali
Exhibition (DATE), pp. 653–658, 2015. Zeadally, “A Survey on Physical Unclonable Function (PUF)-based
Security Solutions for Internet of Things,” 2020.
[8] R. Kumar and W. Burleson, “On design of a highly secure PUF based
on non-linear current mirrors,” in Proc. IEEE International
Authorized licensed use limited to: National Tsing Hua Univ.. Downloaded on June 27,2023 at 06:37:02 UTC from IEEE Xplore. Restrictions apply.