Binding Hardware IPs to Specific FPGA Device via Inter-twining the PUF Response with the FSM of Sequential Circuits

Field-Programmable Custom Computing Machines(2013)

引用 7|浏览0
暂无评分
摘要
The continuous growth in both capability and capacity for FPGA now requires significant resources invested in the hardware design, which results in two classes of main security issues: 1) the unauthorized use and piracy attacks including cloning, reverse engineering, tampering etc. 2) the licensing issue. Binding hardware IPs (HW-IPs) to specific FPGA devices can efficiently resolve these problems. However, previous binding techniques are all based on encryption and hence have three main drawbacks: 1) encryption-based proposals in commercial are limited to protect the single large FPGA configuration, 2) many encryption-based proposals depend on a trusted third party to involve the licensing protocol, and 3) the encryption-based binding methods use costly mechanisms such as secure ROM or flash memory to store FPGA specific cryptographic keys, which is not only expensive but also vulnerable to side-channel attacks, and the management and transport of secret keys became a practical issue. In this work, we propose a PUF-FSM binding technique completely different from the traditional encryption-based methods to address these shortcomings.
更多
查看译文
关键词
sequential circuits,finite state machines,protocols,finite state machine,fpga device,original fsm structure,intellectual property (ip) protection,field-programmable gate array (fpga),proposed puf-fsm binding method,modified fsm,encryption-based binding method,side-channel attack,trusted third party,licensing issue,security issue,fpga design field,puf-fsm binding technique,sequential circuit,field programmable gate array,piracy attack,finite state machine (fsm),binding hardware designs to specific fpga device,fpga core industry,specific fpga device,binding hardware ips,logic design,hardware ip,physically unclonable function,hardware design,physically unclonable functions (pufs),fpga vendor,field programmable gate arrays,encryption-based proposal,new binding mechanism,reuse-based design methodology,puf response,fpga specific cryptographic key,internet protocol,security of data,fpga configuration,side channel attack,databases,hardware,cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要