2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2018
DOI: 10.1109/isvlsi.2018.00066
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Obfuscation Using Strong PUFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…A response is typically derived from the unique physical characteristics (resulting from process variation) of an integrated circuit, such that no two circuits can provide the same response to the same challenge. A PUF can be used as a building block for implementing low-cost authentication protocols [32,58,102,122], key generation applications [101,114,171], intellectual property protection [53,54,174], hardware obfuscation [78,165], prevention of reverse engineering [122,163], intellectual property watermarking [21], software metering [37], or prevention of hardware Trojan embedding [164].…”
Section: Physical Unclonable Functions (Pufs)mentioning
confidence: 99%
“…A response is typically derived from the unique physical characteristics (resulting from process variation) of an integrated circuit, such that no two circuits can provide the same response to the same challenge. A PUF can be used as a building block for implementing low-cost authentication protocols [32,58,102,122], key generation applications [101,114,171], intellectual property protection [53,54,174], hardware obfuscation [78,165], prevention of reverse engineering [122,163], intellectual property watermarking [21], software metering [37], or prevention of hardware Trojan embedding [164].…”
Section: Physical Unclonable Functions (Pufs)mentioning
confidence: 99%
“…Khalegi et al [14] used a similar approach but with a strong PUF with a large CRP space. In order to make the use of a strong PUF feasible, the designer's characterization of the PUF was limited to just a subset of the input set.…”
Section: Prior Puf-based Obfuscation Approachesmentioning
confidence: 99%
“…Thus, if an attacker is able to retrieve the key by some method, it can unlock all chips and effectively overproduce the chips. Recently, physically unclonable functions (PUFs) have been used as a way to provide unique keys for obfuscation [14][15][16]. PUFs are inherent circuit primitives that extract randomness from the physical characteristics of a system at the manufacturing stage [17,18] by applying input challenges and observing random output responses.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the best set of gates for obfuscating maximizes the runtime for deobfuscating. However, until present, selecting the best set of gates is still generally based on human heuristics or experience, which is seriously arbitrary and suboptimal (Khaleghi and Rao, 2018 ). This is due to the inability to “try and error” all the different ways of obfuscation, as there are millions of combinations to try, and the runtime for each try (i.e., to run the attacker) can be extremely time-consuming.…”
Section: Introductionmentioning
confidence: 99%
“…This research topic is vastly underexplored because of its significant challenges: (1) Difficulty in characterizing the hidden and sophisticated algorithmic mechanism of attackers . Over the recent years, a large number of deobfuscation methods have been proposed with various techniques (Khaleghi and Rao, 2018 ). In order to practically beat the attackers, methods with sophisticated theories, rules, and heuristics have been proposed and adopted.…”
Section: Introductionmentioning
confidence: 99%