Testing Methods for PUF-Based Secure Key Storage Circuits

被引:0
|
作者
Mafalda Cortez
Gijs Roelofs
Said Hamdioui
Giorgio Di Natale
机构
[1] Delft University of Technology,Faculty of EE, Mathematics and CS
[2] Université Montpellier II,Giorgio Di Natale LIRMM
来源
关键词
PUF-based systems; Fuzzy Extractor; Secure testing; Scan-chain free testing;
D O I
暂无
中图分类号
学科分类号
摘要
Design for test is an integral part of any VLSI chip. However, for secure systems extra precautions have to be taken to prevent that the test circuitry could reveal secret information. This paper addresses secure test for Physical Unclonable Function based systems. It investigates two secure Built-In Self-Test (BIST) solutions for Fuzzy Extractor (FE) which is the main component of PUF-based systems. The schemes target high stuck-at-fault (SAF) coverage by performing scan-chain free functional testing, to prevent scan-chain abuse for attacks. The first scheme reuses existing FE blocks (for pattern generation and compression) to minimize the area overhead, while the second scheme tests all the FE blocks simultaneously to minimize the test time. The schemes are integrated in FE design and simulated; the results show that for the first test scheme, a SAF fault coverage of 95 % can be realized with no more than 47.1k clock cycles at the cost of a negligible area overhead of only 2.2 %; while for the second test scheme a SAF fault coverage of 95 % can be realized with 3.5k clock cycles at the cost of 18.6 % area overhead. Higher fault coverages are possible to realize at extra cost (i.e., either by extending the test time, or by adding extra hardware, or a combination of both).
引用
收藏
页码:581 / 594
页数:13
相关论文
共 50 条
  • [31] A PUF-Based Low Cost Secure Communication Scheme for IoT
    Li S.-S.
    Huang Y.-C.
    Yu B.
    Bao B.-W.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (04): : 812 - 817
  • [32] Designing secure PUF-based authentication protocols for constrained environments
    Sang-Woong Lee
    Masoumeh Safkhani
    Quynh Le
    Omed Hassan Ahmed
    Mehdi Hosseinzadeh
    Amir Masoud Rahmani
    Nasour Bagheri
    Scientific Reports, 13 (1)
  • [33] PUF-Based Key Distribution in Wireless Sensor Networks
    Zhang, Zheng
    Liu, Yanan
    Zuo, Qinyuan
    Harn, Lein
    Qiu, Shuo
    Cheng, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1261 - 1280
  • [34] PUF-Based Authentication
    Che, Wenjie
    Saqib, Fareena
    Plusquellic, Jim
    2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
  • [35] PUF-based Secure Test Wrapper Design for Network-on-Chip
    Zhang, Ying
    Li, Yuanxiang
    Chen, Xin
    Yang, Jizhong
    Hua, Yifeng
    Yao, Jiaoyan
    2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 181 - 184
  • [36] PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
    Maes, Roel
    Van Herrewege, Anthony
    Verbauwhede, Ingrid
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 302 - 319
  • [37] PUF-Based Mutual Multifactor Entity and Transaction Authentication for Secure Banking
    Resende, Amanda C. Davi
    Mochetti, Karina
    Aranha, Diego F.
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, LIGHTSEC 2015, 2016, 9542 : 77 - 96
  • [38] A PUF-based secure wake-up scheme for Internet of Things
    Lin H.-T.
    Liang Y.-Y.
    Computers and Security, 2021, 110
  • [39] An Error Correction Approach to Memristors PUF-based Key Encapsulation
    Korenda, Ashwija Reddy
    Assiri, Sareh
    Afghah, Fatemeh
    Cambou, Bertrand
    2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, : 7 - 12
  • [40] PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
    Qureshi, Mahmood Azhar
    Munir, Arslan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2457 - 2475