2 Citations (Scopus)

Abstract

This paper presents a design of strong physical unclonable function (PUF) exploiting the sneak paths in the resistive X-point array. The entanglement of the sneak paths in the X-point array greatly enhances the entropy of the physical system, thereby increasing the space of challenge-response pairs. To eliminate the undesired collision or diffuseness in X-point PUF with ``analog'' resistance distribution and ``digital'' resistance distribution is employed in this paper. The effect of design parameters and non-ideal properties in X-point array on the performance of X-point PUF is systematically investigated by Simulation Program with Integrated Circuit Emphasis (SPICE) simulation. The simulation results show that--1) the PUF's performance presents strong dependence on the percent of cells in the on-state, thus should be carefully optimized for the robustness against the reference current variation of the sense amplifier; 2) the interconnect resistance decreases the column current thus the reference current should scale down with the scaling of technology node; 3) larger on/off ratio is desired to achieve low power consumption and high robustness against reference current variation; and 4) the device-to-device variation might degrade the performance of X-point PUF, which can be mitigated with write-verify programming scheme in the PUF construction phase. In addition, the proposed X-point PUF presents no correlation between challenges and responses, and strong security against the possible SPICE modeling attack and machine learning attack. Compared with the conventional Arbiter PUF, the X-point PUF has benefits in smaller area, lower energy, and enhanced security.

Original languageEnglish (US)
JournalIEEE Transactions on Circuits and Systems I: Regular Papers
DOIs
StateAccepted/In press - Mar 14 2018

Fingerprint

Integrated circuits
Hardware security
Circuit simulation
Learning systems
Electric power utilization
Entropy

Keywords

  • hardware security.
  • PUF
  • reliability
  • resistive memory
  • sneak path
  • uniqueness
  • X-point array

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

X-Point PUF : Exploiting Sneak Paths for a Strong Physical Unclonable Function Design. / Liu, Rui; Chen, Pai Yu; Peng, Xiaochen; Yu, Shimeng.

In: IEEE Transactions on Circuits and Systems I: Regular Papers, 14.03.2018.

Research output: Contribution to journalArticle

@article{67c85c12921c4205b00f7d003cf35976,
title = "X-Point PUF: Exploiting Sneak Paths for a Strong Physical Unclonable Function Design",
abstract = "This paper presents a design of strong physical unclonable function (PUF) exploiting the sneak paths in the resistive X-point array. The entanglement of the sneak paths in the X-point array greatly enhances the entropy of the physical system, thereby increasing the space of challenge-response pairs. To eliminate the undesired collision or diffuseness in X-point PUF with ``analog'' resistance distribution and ``digital'' resistance distribution is employed in this paper. The effect of design parameters and non-ideal properties in X-point array on the performance of X-point PUF is systematically investigated by Simulation Program with Integrated Circuit Emphasis (SPICE) simulation. The simulation results show that--1) the PUF's performance presents strong dependence on the percent of cells in the on-state, thus should be carefully optimized for the robustness against the reference current variation of the sense amplifier; 2) the interconnect resistance decreases the column current thus the reference current should scale down with the scaling of technology node; 3) larger on/off ratio is desired to achieve low power consumption and high robustness against reference current variation; and 4) the device-to-device variation might degrade the performance of X-point PUF, which can be mitigated with write-verify programming scheme in the PUF construction phase. In addition, the proposed X-point PUF presents no correlation between challenges and responses, and strong security against the possible SPICE modeling attack and machine learning attack. Compared with the conventional Arbiter PUF, the X-point PUF has benefits in smaller area, lower energy, and enhanced security.",
keywords = "hardware security., PUF, reliability, resistive memory, sneak path, uniqueness, X-point array",
author = "Rui Liu and Chen, {Pai Yu} and Xiaochen Peng and Shimeng Yu",
year = "2018",
month = "3",
day = "14",
doi = "10.1109/TCSI.2018.2811643",
language = "English (US)",
journal = "IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications",
issn = "1549-8328",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - JOUR

T1 - X-Point PUF

T2 - Exploiting Sneak Paths for a Strong Physical Unclonable Function Design

AU - Liu, Rui

AU - Chen, Pai Yu

AU - Peng, Xiaochen

AU - Yu, Shimeng

PY - 2018/3/14

Y1 - 2018/3/14

N2 - This paper presents a design of strong physical unclonable function (PUF) exploiting the sneak paths in the resistive X-point array. The entanglement of the sneak paths in the X-point array greatly enhances the entropy of the physical system, thereby increasing the space of challenge-response pairs. To eliminate the undesired collision or diffuseness in X-point PUF with ``analog'' resistance distribution and ``digital'' resistance distribution is employed in this paper. The effect of design parameters and non-ideal properties in X-point array on the performance of X-point PUF is systematically investigated by Simulation Program with Integrated Circuit Emphasis (SPICE) simulation. The simulation results show that--1) the PUF's performance presents strong dependence on the percent of cells in the on-state, thus should be carefully optimized for the robustness against the reference current variation of the sense amplifier; 2) the interconnect resistance decreases the column current thus the reference current should scale down with the scaling of technology node; 3) larger on/off ratio is desired to achieve low power consumption and high robustness against reference current variation; and 4) the device-to-device variation might degrade the performance of X-point PUF, which can be mitigated with write-verify programming scheme in the PUF construction phase. In addition, the proposed X-point PUF presents no correlation between challenges and responses, and strong security against the possible SPICE modeling attack and machine learning attack. Compared with the conventional Arbiter PUF, the X-point PUF has benefits in smaller area, lower energy, and enhanced security.

AB - This paper presents a design of strong physical unclonable function (PUF) exploiting the sneak paths in the resistive X-point array. The entanglement of the sneak paths in the X-point array greatly enhances the entropy of the physical system, thereby increasing the space of challenge-response pairs. To eliminate the undesired collision or diffuseness in X-point PUF with ``analog'' resistance distribution and ``digital'' resistance distribution is employed in this paper. The effect of design parameters and non-ideal properties in X-point array on the performance of X-point PUF is systematically investigated by Simulation Program with Integrated Circuit Emphasis (SPICE) simulation. The simulation results show that--1) the PUF's performance presents strong dependence on the percent of cells in the on-state, thus should be carefully optimized for the robustness against the reference current variation of the sense amplifier; 2) the interconnect resistance decreases the column current thus the reference current should scale down with the scaling of technology node; 3) larger on/off ratio is desired to achieve low power consumption and high robustness against reference current variation; and 4) the device-to-device variation might degrade the performance of X-point PUF, which can be mitigated with write-verify programming scheme in the PUF construction phase. In addition, the proposed X-point PUF presents no correlation between challenges and responses, and strong security against the possible SPICE modeling attack and machine learning attack. Compared with the conventional Arbiter PUF, the X-point PUF has benefits in smaller area, lower energy, and enhanced security.

KW - hardware security.

KW - PUF

KW - reliability

KW - resistive memory

KW - sneak path

KW - uniqueness

KW - X-point array

UR - http://www.scopus.com/inward/record.url?scp=85043783707&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85043783707&partnerID=8YFLogxK

U2 - 10.1109/TCSI.2018.2811643

DO - 10.1109/TCSI.2018.2811643

M3 - Article

JO - IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications

JF - IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications

SN - 1549-8328

ER -