Difference between revisions of "Majzoobi2008"

From ACES

(Import from BibTeX)
 
m (Import from BibTeX)
Line 3: Line 3:
|abstract=<p>System security has emerged as a premier design requirement. While there has been an enormous body of impressive work on testing integrated circuits (ICs) desiderata such as manufacturing correctness, delay, and power, there is no reported effort to systematically test IC security in hardware. Our goal is to provide an impetus for this line of research and development by introducing techniques and methodology for rigorous testing of physically unclonable functions (PUFs). Recently, PUFs received a great deal of attention as security mechanisms due to their flexibility to form numerous security protocols and intrinsic resiliency against physical and side channels attacks. We study three classes of PUFs properties to design pertinent test methods: (i) predictability, (ii) sensitivity to component accuracy, and (iii) susceptibility to reverse engineering. As our case studies, we analyze two popular PUF structures, linear and feed-forward, and show that their security is not adequate from several points of view. The technical highlights of the paper are the first non-destructive technique for PUF reverse engineering and a new PUF structure that is capable of passing our security tests.</p>
|abstract=<p>System security has emerged as a premier design requirement. While there has been an enormous body of impressive work on testing integrated circuits (ICs) desiderata such as manufacturing correctness, delay, and power, there is no reported effort to systematically test IC security in hardware. Our goal is to provide an impetus for this line of research and development by introducing techniques and methodology for rigorous testing of physically unclonable functions (PUFs). Recently, PUFs received a great deal of attention as security mechanisms due to their flexibility to form numerous security protocols and intrinsic resiliency against physical and side channels attacks. We study three classes of PUFs properties to design pertinent test methods: (i) predictability, (ii) sensitivity to component accuracy, and (iii) susceptibility to reverse engineering. As our case studies, we analyze two popular PUF structures, linear and feed-forward, and show that their security is not adequate from several points of view. The technical highlights of the paper are the first non-destructive technique for PUF reverse engineering and a new PUF structure that is capable of passing our security tests.</p>
|pages=1 - 10
|pages=1 - 10
|month=
|year=2008
|booktitle=International Test Conference (ITC)
|booktitle=International Test Conference (ITC)
|title=Testing Techniques for Hardware Security
|title=Testing Techniques for Hardware Security
|entry=inproceedings
|entry=inproceedings
|date=2008-20-01
}}
}}

Revision as of 03:34, 4 September 2021

Majzoobi2008
entryinproceedings
address
annote
authorMehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag
booktitleInternational Test Conference (ITC)
chapter
edition
editor
howpublished
institution
journal
month
note
number
organization
pages1 - 10
publisher
school
series
titleTesting Techniques for Hardware Security
type
volume
year2008
doi
issn
isbn
url
pdf


Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093