{"title":"如何安全地从预制芯片中检索PUF响应?","authors":"Aijiao Cui, Yuxi Wang","doi":"10.1109/ISQED48828.2020.9137044","DOIUrl":null,"url":null,"abstract":"Physical unclonable function (PUF) has been widely applied as a security primitive in multiple authentication schemes. It is usually adopted in the chip design and used to generate a unique key to authenticate one with key to operate the design normally. PUF responses hence need to be retrieved in a secure way rather than be accessible to anyone. To highlight the importance of this issue, we first identify the scenarios where secure retrieval of PUF response is necessary. We then propose the principle to retrieve the PUF-based key in a secure way and discuss the evaluation criteria. We survey, classify and evaluate the existing work on this issue and analyze the advantages and disadvantages of each scheme. Suggestions are finally given for the designers to select appropriate retrieval scheme in a specific hardware design.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"107 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How to Retrieve PUF Response from a Fabricated Chip Securely?\",\"authors\":\"Aijiao Cui, Yuxi Wang\",\"doi\":\"10.1109/ISQED48828.2020.9137044\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical unclonable function (PUF) has been widely applied as a security primitive in multiple authentication schemes. It is usually adopted in the chip design and used to generate a unique key to authenticate one with key to operate the design normally. PUF responses hence need to be retrieved in a secure way rather than be accessible to anyone. To highlight the importance of this issue, we first identify the scenarios where secure retrieval of PUF response is necessary. We then propose the principle to retrieve the PUF-based key in a secure way and discuss the evaluation criteria. We survey, classify and evaluate the existing work on this issue and analyze the advantages and disadvantages of each scheme. Suggestions are finally given for the designers to select appropriate retrieval scheme in a specific hardware design.\",\"PeriodicalId\":225828,\"journal\":{\"name\":\"2020 21st International Symposium on Quality Electronic Design (ISQED)\",\"volume\":\"107 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 21st International Symposium on Quality Electronic Design (ISQED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISQED48828.2020.9137044\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 21st International Symposium on Quality Electronic Design (ISQED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISQED48828.2020.9137044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
How to Retrieve PUF Response from a Fabricated Chip Securely?
Physical unclonable function (PUF) has been widely applied as a security primitive in multiple authentication schemes. It is usually adopted in the chip design and used to generate a unique key to authenticate one with key to operate the design normally. PUF responses hence need to be retrieved in a secure way rather than be accessible to anyone. To highlight the importance of this issue, we first identify the scenarios where secure retrieval of PUF response is necessary. We then propose the principle to retrieve the PUF-based key in a secure way and discuss the evaluation criteria. We survey, classify and evaluate the existing work on this issue and analyze the advantages and disadvantages of each scheme. Suggestions are finally given for the designers to select appropriate retrieval scheme in a specific hardware design.