Vinay C. Patil, Arunkumar Vijayakumar, Daniel E. Holcomb, S. Kundu
{"title":"Improving reliability of weak PUFs via circuit techniques to enhance mismatch","authors":"Vinay C. Patil, Arunkumar Vijayakumar, Daniel E. Holcomb, S. Kundu","doi":"10.1109/HST.2017.7951814","DOIUrl":null,"url":null,"abstract":"In recent years, SRAM-based and other Weak PUFs have found applications in tamper sensitive key storage and ID generation. SRAM-based PUFs, for example, rely on intrinsic process variations to enable repeatable and unique start-up behavior of their outputs. However, noise in the system can compromise repeatability of SRAM start-up behavior. To obviate this problem, a number of solutions such as fuzzy extraction and error correcting codes have been proposed to generate a stable key from PUF cells. However, these methods require a large number of initial PUF bits. In this work, we discuss circuit techniques that create new Weak PUFs by modifying the cross-coupled elements of a traditional storage cell to amplify the impact of process variations and create a higher degree of mismatch. With increased mismatch, the intrinsic error rates of the new PUF cells decrease, thereby reducing the number of PUF cells and amount of auxiliary circuitry needed for fuzzy extraction or ECC. Our results show that the new designs give 4x to 9x reduction in error rates compared to a standard cross-coupled inverter design. We also highlight the area savings that can be achieved in hardware implementations of ECC systems due to improving the inherent reliability of the PUF cells.","PeriodicalId":190635,"journal":{"name":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2017.7951814","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
In recent years, SRAM-based and other Weak PUFs have found applications in tamper sensitive key storage and ID generation. SRAM-based PUFs, for example, rely on intrinsic process variations to enable repeatable and unique start-up behavior of their outputs. However, noise in the system can compromise repeatability of SRAM start-up behavior. To obviate this problem, a number of solutions such as fuzzy extraction and error correcting codes have been proposed to generate a stable key from PUF cells. However, these methods require a large number of initial PUF bits. In this work, we discuss circuit techniques that create new Weak PUFs by modifying the cross-coupled elements of a traditional storage cell to amplify the impact of process variations and create a higher degree of mismatch. With increased mismatch, the intrinsic error rates of the new PUF cells decrease, thereby reducing the number of PUF cells and amount of auxiliary circuitry needed for fuzzy extraction or ECC. Our results show that the new designs give 4x to 9x reduction in error rates compared to a standard cross-coupled inverter design. We also highlight the area savings that can be achieved in hardware implementations of ECC systems due to improving the inherent reliability of the PUF cells.