1. Key Generation for Hardware Obfuscation Using Strong PUFs
- Author
-
Shahed Enamul Quadir and John A. Chandy
- Subjects
Reverse engineering ,Record locking ,Computer Networks and Communications ,Computer science ,Physical unclonable function ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,computer.software_genre ,lcsh:Technology ,01 natural sciences ,obfuscation ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Hardware_INTEGRATEDCIRCUITS ,010302 applied physics ,Key generation ,Authentication ,lcsh:T ,business.industry ,Applied Mathematics ,Chip ,020202 computer hardware & architecture ,Computer Science Applications ,Obfuscation (software) ,Computational Theory and Mathematics ,Embedded system ,Hardware obfuscation ,authentication ,counterfeiting ,physically unclonable function ,business ,computer ,Software ,key generation - Abstract
As a result of the increased use of contract foundries, internet protocol (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries. Hardware obfuscation and IP locking can be used to make a design secure by replacing a part of the circuit with a key-locked module. In order to ensure each chip has unique keys, previous work has proposed using physical unclonable functions (PUF) to lock the circuit. However, these designs are area intensive. In this work, we propose a strong PUF-based hardware obfuscation scheme to uniquely lock each chip.
- Published
- 2019
- Full Text
- View/download PDF