Abstract
The contamination of electronic component supply chains by counterfeit hardware devices is a serious and growing risk in today’s globalized marketplace. Current best practice for detecting counterfeit semiconductors includes visual checking, electrical testing, and reliability testing, all of which require significant investments in expertise, equipment, and time. In TRUST’11, Koeberl, Li, Rajan, Vishik, and Wu proposed a new device authentication scheme using SRAM Physically Unclonable Functions (PUFs) for semiconductor anti-counterfeiting. Their authentication scheme is simple, low cost, and practical. However, the method and corresponding parameters of their scheme are based on a theoretical SRAM PUF model without support from real experimental data. In this paper, we evaluate a real SRAM PUF on a discrete 0.13um SRAM, and use the PUF result to evaluate this device authentication scheme and show that this scheme indeed works well. We identify several gaps between the theoretical model and the experimental SRAM PUF result, and adjust the parameters of the scheme accordingly. In addition, we provide a new post-processing function that results in a smaller false rejection rate and false acceptance rate.
| Original language | English |
|---|---|
| Title of host publication | Trusted Systems |
| Subtitle of host publication | Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers |
| Editors | Liqun Chen, Moti Yung, Liehuang Zhu |
| Publisher | Springer |
| Pages | 271-288 |
| Number of pages | 18 |
| ISBN (Electronic) | 978-3-642-32298-3 |
| ISBN (Print) | 978-3-642-32297-6 |
| DOIs | |
| Publication status | Published - 4 Jul 2012 |
| Externally published | Yes |
Fingerprint
Dive into the research topics of 'Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver