Physical unclonable functions and intellectual property protection techniques

Ramesh Karri, Ozgur Sinanoglu, Jeyavijayan Rajendran

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

On one hand, traditionally, secure systems rely on hardware to store the keys for cryptographic protocols. Such an approach is becoming increasingly insecure, due to hardware-intrinsic vulnerabilities. A physical unclonable function (PUF) is a security primitive that exploits inherent hardware properties to generate keys on the fly, instead of storing them. On the other hand, the integrated circuit (IC) design flow is globalized due to increase in design, fabrication, testing, and verification costs. While globalization has provided cost benefits and reduced the time-to-market, it has introduced several attacks such as piracy, malicious modifications, and counterfeiting. To thwart these attacks, researchers have developed techniques that modify the designs and include additional components into the design. Such techniques are collectively called intellectual property (IP) protection techniques. In this chapter, we describe two classes of hardware security techniques: PUFs and IP protection techniques.

Original languageEnglish (US)
Title of host publicationFundamentals of IP and SoC Security: Design, Verification, and Debug
PublisherSpringer International Publishing
Pages199-222
Number of pages24
ISBN (Electronic)9783319500577
ISBN (Print)9783319500553
DOIs
StatePublished - Jan 1 2017

Fingerprint

Intellectual property
Hardware
Computer hardware
Costs
Network protocols
Fabrication
Testing
Hardware security

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Science(all)

Cite this

Karri, R., Sinanoglu, O., & Rajendran, J. (2017). Physical unclonable functions and intellectual property protection techniques. In Fundamentals of IP and SoC Security: Design, Verification, and Debug (pp. 199-222). Springer International Publishing. https://doi.org/10.1007/978-3-319-50057-7_8

Physical unclonable functions and intellectual property protection techniques. / Karri, Ramesh; Sinanoglu, Ozgur; Rajendran, Jeyavijayan.

Fundamentals of IP and SoC Security: Design, Verification, and Debug. Springer International Publishing, 2017. p. 199-222.

Research output: Chapter in Book/Report/Conference proceedingChapter

Karri, R, Sinanoglu, O & Rajendran, J 2017, Physical unclonable functions and intellectual property protection techniques. in Fundamentals of IP and SoC Security: Design, Verification, and Debug. Springer International Publishing, pp. 199-222. https://doi.org/10.1007/978-3-319-50057-7_8
Karri R, Sinanoglu O, Rajendran J. Physical unclonable functions and intellectual property protection techniques. In Fundamentals of IP and SoC Security: Design, Verification, and Debug. Springer International Publishing. 2017. p. 199-222 https://doi.org/10.1007/978-3-319-50057-7_8
Karri, Ramesh ; Sinanoglu, Ozgur ; Rajendran, Jeyavijayan. / Physical unclonable functions and intellectual property protection techniques. Fundamentals of IP and SoC Security: Design, Verification, and Debug. Springer International Publishing, 2017. pp. 199-222
@inbook{e47d543c96ed40a1a7382981bf2500e7,
title = "Physical unclonable functions and intellectual property protection techniques",
abstract = "On one hand, traditionally, secure systems rely on hardware to store the keys for cryptographic protocols. Such an approach is becoming increasingly insecure, due to hardware-intrinsic vulnerabilities. A physical unclonable function (PUF) is a security primitive that exploits inherent hardware properties to generate keys on the fly, instead of storing them. On the other hand, the integrated circuit (IC) design flow is globalized due to increase in design, fabrication, testing, and verification costs. While globalization has provided cost benefits and reduced the time-to-market, it has introduced several attacks such as piracy, malicious modifications, and counterfeiting. To thwart these attacks, researchers have developed techniques that modify the designs and include additional components into the design. Such techniques are collectively called intellectual property (IP) protection techniques. In this chapter, we describe two classes of hardware security techniques: PUFs and IP protection techniques.",
author = "Ramesh Karri and Ozgur Sinanoglu and Jeyavijayan Rajendran",
year = "2017",
month = "1",
day = "1",
doi = "10.1007/978-3-319-50057-7_8",
language = "English (US)",
isbn = "9783319500553",
pages = "199--222",
booktitle = "Fundamentals of IP and SoC Security: Design, Verification, and Debug",
publisher = "Springer International Publishing",

}

TY - CHAP

T1 - Physical unclonable functions and intellectual property protection techniques

AU - Karri, Ramesh

AU - Sinanoglu, Ozgur

AU - Rajendran, Jeyavijayan

PY - 2017/1/1

Y1 - 2017/1/1

N2 - On one hand, traditionally, secure systems rely on hardware to store the keys for cryptographic protocols. Such an approach is becoming increasingly insecure, due to hardware-intrinsic vulnerabilities. A physical unclonable function (PUF) is a security primitive that exploits inherent hardware properties to generate keys on the fly, instead of storing them. On the other hand, the integrated circuit (IC) design flow is globalized due to increase in design, fabrication, testing, and verification costs. While globalization has provided cost benefits and reduced the time-to-market, it has introduced several attacks such as piracy, malicious modifications, and counterfeiting. To thwart these attacks, researchers have developed techniques that modify the designs and include additional components into the design. Such techniques are collectively called intellectual property (IP) protection techniques. In this chapter, we describe two classes of hardware security techniques: PUFs and IP protection techniques.

AB - On one hand, traditionally, secure systems rely on hardware to store the keys for cryptographic protocols. Such an approach is becoming increasingly insecure, due to hardware-intrinsic vulnerabilities. A physical unclonable function (PUF) is a security primitive that exploits inherent hardware properties to generate keys on the fly, instead of storing them. On the other hand, the integrated circuit (IC) design flow is globalized due to increase in design, fabrication, testing, and verification costs. While globalization has provided cost benefits and reduced the time-to-market, it has introduced several attacks such as piracy, malicious modifications, and counterfeiting. To thwart these attacks, researchers have developed techniques that modify the designs and include additional components into the design. Such techniques are collectively called intellectual property (IP) protection techniques. In this chapter, we describe two classes of hardware security techniques: PUFs and IP protection techniques.

UR - http://www.scopus.com/inward/record.url?scp=85015016555&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85015016555&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-50057-7_8

DO - 10.1007/978-3-319-50057-7_8

M3 - Chapter

SN - 9783319500553

SP - 199

EP - 222

BT - Fundamentals of IP and SoC Security: Design, Verification, and Debug

PB - Springer International Publishing

ER -