• DocumentCode
    1786863
  • Title

    Reverse engineering and prevention techniques for physical unclonable functions using side channels

  • Author

    Sheng Wei ; Wendt, James B. ; Nahapetiany, Ani ; Potkonjak, Miodrag

  • Author_Institution
    Univ. of California, Los Angeles, Los Angeles, CA, USA
  • fYear
    2014
  • fDate
    1-5 June 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    This paper investigates and addresses the vulnerabilities of existing physical unclonable functions (PUFs). We first develop a PUF reverse engineering approach by conducting gate-level characterization (GLC). Based on the gate-level delay properties, we emulate the target PUF by designing a functionally equivalent PUF replication. Furthermore, in order to prevent such an attack, we develop a new sequential PUF architecture that is resilient to side channel-based reverse engineering. We obtain accurate results in emulating the timing behavior of the existing arbiter-based PUFs. Also, the randomness obtained from the sequential PUFs is significantly higher compared to the existing PUFs.
  • Keywords
    cryptography; reverse engineering; GLC; PUF reverse engineering approach; gate-level characterization; gate-level delay properties; physical unclonable functions; prevention techniques; sequential PUF architecture; side channels; Delays; Emulation; Equations; Integrated circuits; Logic gates; Mathematical model; Reverse engineering;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE
  • Conference_Location
    San Francisco, CA
  • Type

    conf

  • DOI
    10.1145/2593069.2593204
  • Filename
    6881417