Error reduction of SRAM-based physically unclonable function for chip authentication

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 137
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Moon-Seokko
dc.contributor.authorKim, Sunhoko
dc.contributor.authorYoo, Sang-Kyungko
dc.contributor.authorLee, Bong-Sooko
dc.contributor.authorYu, Ji-manko
dc.contributor.authorTcho, Il-Woongko
dc.contributor.authorChoi, Yang-Kyuko
dc.date.accessioned2023-10-06T02:00:27Z-
dc.date.available2023-10-06T02:00:27Z-
dc.date.created2023-02-27-
dc.date.issued2023-10-
dc.identifier.citationINTERNATIONAL JOURNAL OF INFORMATION SECURITY, v.22, no.5, pp.1087 - 1098-
dc.identifier.issn1615-5262-
dc.identifier.urihttp://hdl.handle.net/10203/313059-
dc.description.abstractSRAM-based physically unclonable function (PUF) is an attractive security primitive for cryptographic protocol and security architecture because SRAM itself is one of the most widely used embedded memories. In terms of robustness, however, there is a weakness for SRAM PUF owing to a bit error; thus, a method must be explored to reduce this error. In this work, a novel hardware chip to characterize cell-to-cell entropy is demonstrated for robust SRAM based PUF by implementation of a screening test to filter out poor cells. We design a chip with a power controller, circuits for error correction coding, a SRAM array and central processing unit. Then it was fabricated by a foundry service. We also propose a procedure to suppress the bit error by use of a screening test, which is based on SRAM cells possessing their own entropy. Through the screening test, the bit error rate (BER) is reduced to below 10 - 6, which is much smaller than the BER of 0.05 in previous reports, i.e., the robustness is notably improved. Moreover, this robustness was evaluated in terms of an error correction code (ECC) failure rate and temperature after the screening test. SRAM-based PUF with enhanced robustness can contribute to implementing a security protocol and architecture for chip authentication. © 2023, The Author(s), under exclusive licence to Springer-Verlag GmbH, DE.-
dc.languageEnglish-
dc.publisherSPRINGER-
dc.titleError reduction of SRAM-based physically unclonable function for chip authentication-
dc.typeArticle-
dc.identifier.wosid000935889700001-
dc.identifier.scopusid2-s2.0-85148460790-
dc.type.rimsART-
dc.citation.volume22-
dc.citation.issue5-
dc.citation.beginningpage1087-
dc.citation.endingpage1098-
dc.citation.publicationnameINTERNATIONAL JOURNAL OF INFORMATION SECURITY-
dc.identifier.doi10.1007/s10207-023-00668-0-
dc.contributor.localauthorChoi, Yang-Kyu-
dc.contributor.nonIdAuthorKim, Moon-Seok-
dc.contributor.nonIdAuthorKim, Sunho-
dc.contributor.nonIdAuthorYoo, Sang-Kyung-
dc.contributor.nonIdAuthorLee, Bong-Soo-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorPhysically unclonable function (PUF)-
dc.subject.keywordAuthorStatic random access memory (SRAM)-
dc.subject.keywordAuthorScreening test-
dc.subject.keywordAuthorError-correcting code (ECC)-
dc.subject.keywordAuthorUnit cell entropy-
dc.subject.keywordPlusMACHINE-LEARNING ATTACKS-
dc.subject.keywordPlusPUF-
dc.subject.keywordPlusFLUCTUATION-
dc.subject.keywordPlusPROTOCOL-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0