These labels were automatically added by AI and may be inaccurate. For details, see About Literature Database.
Abstract
Physical Unclonable Functions (PUFs) leverage manufacturing process
imperfections that cause propagation delay discrepancies for the signals
traveling along these paths. While PUFs can be used for device authentication
and chip-specific key generation, strong PUFs have been shown to be vulnerable
to machine learning modeling attacks. Although there is an impression that
combinational circuits must be designed without any loops, cyclic combinational
circuits have been shown to increase design security against hardware
intellectual property theft. In this paper, we introduce feedback signals into
traditional delay-based PUF designs such as arbiter PUF, ring oscillator PUF,
and butterfly PUF to give them a wider range of possible output behaviors and
thus an edge against modeling attacks. Based on our analysis, cyclic PUFs
produce responses that can be binary, steady-state, oscillating, or
pseudo-random under fixed challenges. The proposed cyclic PUFs are implemented
in field programmable gate arrays, and their power and area overhead, in
addition to functional metrics, are reported compared with their traditional
counterparts. The security gain of the proposed cyclic PUFs is also shown
against state-of-the-art attacks.