Difference between revisions of "Majzoobi2008"
From ACES
(Import from BibTeX) |
m (Import from BibTeX) |
||
Line 3: | Line 3: | ||
|abstract=<p>System security has emerged as a premier design requirement. While there has been an enormous body of impressive work on testing integrated circuits (ICs) desiderata such as manufacturing correctness, delay, and power, there is no reported effort to systematically test IC security in hardware. Our goal is to provide an impetus for this line of research and development by introducing techniques and methodology for rigorous testing of physically unclonable functions (PUFs). Recently, PUFs received a great deal of attention as security mechanisms due to their flexibility to form numerous security protocols and intrinsic resiliency against physical and side channels attacks. We study three classes of PUFs properties to design pertinent test methods: (i) predictability, (ii) sensitivity to component accuracy, and (iii) susceptibility to reverse engineering. As our case studies, we analyze two popular PUF structures, linear and feed-forward, and show that their security is not adequate from several points of view. The technical highlights of the paper are the first non-destructive technique for PUF reverse engineering and a new PUF structure that is capable of passing our security tests.</p> | |abstract=<p>System security has emerged as a premier design requirement. While there has been an enormous body of impressive work on testing integrated circuits (ICs) desiderata such as manufacturing correctness, delay, and power, there is no reported effort to systematically test IC security in hardware. Our goal is to provide an impetus for this line of research and development by introducing techniques and methodology for rigorous testing of physically unclonable functions (PUFs). Recently, PUFs received a great deal of attention as security mechanisms due to their flexibility to form numerous security protocols and intrinsic resiliency against physical and side channels attacks. We study three classes of PUFs properties to design pertinent test methods: (i) predictability, (ii) sensitivity to component accuracy, and (iii) susceptibility to reverse engineering. As our case studies, we analyze two popular PUF structures, linear and feed-forward, and show that their security is not adequate from several points of view. The technical highlights of the paper are the first non-destructive technique for PUF reverse engineering and a new PUF structure that is capable of passing our security tests.</p> | ||
|pages=1 - 10 | |pages=1 - 10 | ||
|month= | |||
|year=2008 | |||
|booktitle=International Test Conference (ITC) | |booktitle=International Test Conference (ITC) | ||
|title=Testing Techniques for Hardware Security | |title=Testing Techniques for Hardware Security | ||
|entry=inproceedings | |entry=inproceedings | ||
}} | }} |
Revision as of 03:34, 4 September 2021
Majzoobi2008 | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag |
booktitle | International Test Conference (ITC) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | |
note | |
number | |
organization | |
pages | 1 - 10 |
publisher | |
school | |
series | |
title | Testing Techniques for Hardware Security |
type | |
volume | |
year | 2008 |
doi | |
issn | |
isbn | |
url | |