TY - JOUR
T1 - Using both Stable and Unstable SRAM Bits for the Physical Unclonable Function
AU - Lai, Zhi Wei
AU - Huang, Po Hua
AU - Lee, Kuen Jong
N1 - Funding Information:
We would like to thank the anonymous reviewers for their constructive feedback. This work was partially supported by the Ministry of Science and Technology of Taiwan under Contract 107-2218-E-006-025.
Publisher Copyright:
© 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2022/10
Y1 - 2022/10
N2 - Recently Physical Unclonable Functions (PUFs) of IC chips have been used in electronic systems for secret key generation and device authentication. Among all available PUFs, SRAM PUF is a popular one because SRAM is a standard component for most electronic devices, and it possesses good randomness during power-on. Previously only strongly stable SRAM bits are selected as PUF bits, which generally requires a large number of SRAM bits. Furthermore, SRAM PUFs may suffer from PUF clone attacks as attackers may use the Photon Emission Analysis (PEA) device to observe the behavior of stable bits and conduct circuit edit via Focused Ion Beam (FIB) to produce identical PUFs. In this paper we propose two methods that employ unstable bits as PUF bits in addition to stable bits to increase the SRAM bit usage rate. These two methods can resist the PUF clone attack as it is very difficult to reproduce unstable bits. Extensive experiments have been conducted, and the results show that though unstable bits are used, high reliability is still achieved.
AB - Recently Physical Unclonable Functions (PUFs) of IC chips have been used in electronic systems for secret key generation and device authentication. Among all available PUFs, SRAM PUF is a popular one because SRAM is a standard component for most electronic devices, and it possesses good randomness during power-on. Previously only strongly stable SRAM bits are selected as PUF bits, which generally requires a large number of SRAM bits. Furthermore, SRAM PUFs may suffer from PUF clone attacks as attackers may use the Photon Emission Analysis (PEA) device to observe the behavior of stable bits and conduct circuit edit via Focused Ion Beam (FIB) to produce identical PUFs. In this paper we propose two methods that employ unstable bits as PUF bits in addition to stable bits to increase the SRAM bit usage rate. These two methods can resist the PUF clone attack as it is very difficult to reproduce unstable bits. Extensive experiments have been conducted, and the results show that though unstable bits are used, high reliability is still achieved.
UR - http://www.scopus.com/inward/record.url?scp=85140224379&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85140224379&partnerID=8YFLogxK
U2 - 10.1007/s10836-022-06025-8
DO - 10.1007/s10836-022-06025-8
M3 - Article
AN - SCOPUS:85140224379
SN - 0923-8174
VL - 38
SP - 511
EP - 525
JO - Journal of Electronic Testing: Theory and Applications (JETTA)
JF - Journal of Electronic Testing: Theory and Applications (JETTA)
IS - 5
ER -