Difference between revisions of "Majzoobi2010fpga"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 4: | Line 4: | ||
|url=http://dl.acm.org/citation.cfm?id=1929305 | |url=http://dl.acm.org/citation.cfm?id=1929305 | ||
|abstract=<p>This paper introduces a novel technique for extracting the unique timing signatures of the FPGA configurable logic blocks in a digital form over the space of possible challenges. A new class of physical unclonable functions that enables inputs challenges such as timing, digital, and placement challenges can be built upon the delay signatures. We introduce a suite of new authentication protocols that take into account non-triviality of bitstream reverse-engineering in addition to the FPGA\’s unprecedented speed in responding to challenges. Our technique is secure against various attacks and robust to fluctuations in operational conditions. Proof of concept implementation of the signature extraction and evaluations of the proposed methods are demonstrated on Xilinx Virtex 5 FPGAs. Experimental results demonstrate practicality of the proposed techniques.</p> | |abstract=<p>This paper introduces a novel technique for extracting the unique timing signatures of the FPGA configurable logic blocks in a digital form over the space of possible challenges. A new class of physical unclonable functions that enables inputs challenges such as timing, digital, and placement challenges can be built upon the delay signatures. We introduce a suite of new authentication protocols that take into account non-triviality of bitstream reverse-engineering in addition to the FPGA\’s unprecedented speed in responding to challenges. Our technique is secure against various attacks and robust to fluctuations in operational conditions. Proof of concept implementation of the signature extraction and evaluations of the proposed methods are demonstrated on Xilinx Virtex 5 FPGAs. Experimental results demonstrate practicality of the proposed techniques.</p> | ||
|month=5 | |||
|year=2010 | |||
|series=Lecture Notes in Computer Science | |series=Lecture Notes in Computer Science | ||
|booktitle=Information Hiding | |booktitle=Information Hiding | ||
|title=FPGA Time-Bounded Unclonable Authentication | |title=FPGA Time-Bounded Unclonable Authentication | ||
|entry=inproceedings | |entry=inproceedings | ||
| | |pdf=Majzoobi2010fpga.pdf | ||
}} | }} |
Latest revision as of 17:37, 9 November 2021
Majzoobi2010fpga | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Mehrdad Majzoobi and Ahmed Elnably and Farinaz Koushanfar |
booktitle | Information Hiding |
chapter | |
edition | |
editor | Rainer B{\"o}hme and Philip Fong and Reihaneh {Safavi-Naini} |
howpublished | |
institution | |
journal | |
month | 5 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | Lecture Notes in Computer Science |
title | FPGA Time-Bounded Unclonable Authentication |
type | |
volume | |
year | 2010 |
doi | |
issn | |
isbn | |
url | http://dl.acm.org/citation.cfm?id=1929305 |
Majzoobi2010fpga.pdf |