Methods, algorithms and hardware for protecting integrated circuits from unauthorized access

Anton Boronnikov

Abstract


The paper presents the results of research in the field of trusted design of integrated circuits. The main methods of protection of integrated circuits are considered. A promising direction is highlighted in the using physical unclonable functions’ form to use their responses in the unique identifiers’ form. The work of a physical unclonable function of the arbiter type and the main schemes with this function for generating identifiers are analyzed in detail. The main existing methods and hardware solutions for the identification of integrated circuits are considered and their disadvantages are identified. A method of data encryption using metastable states of the physical unclonable function of the arbiter type has been developed, which allows generating a unique key value with each new clock cycle. A hardware functional block is proposed designed to automatically set the arbiter of a physical unclonable function to a metastable state for the subsequent operation of this block in the mode of generating truly random numbers. An original method of decoding encrypted data using a functional encryption block based on a physical unclonable function of the arbiter type, based on a change in crystal temperature, is proposed. A scheme and algorithm for activating the resources of an integrated circuit have been developed, which are maximally protected from reverse engineering.


Full Text:

PDF (Russian)

References


Grebenshchikov P. Detection of counterfeit products in the field of microelectronics // Electronics: science, technology, business. – 2019. –- № 6 (187). – pp. 172-175 (in Russian).

Kessarinsky L.N., Shirin A.O., Koval K.A., Tayibov F.F., Kameneva A.S. Detection of counterfeit signs in the products of electronic component base in the aspect of industrial cybersecurity // Information technology security. – 2019. – Vol. 26, № 2. – pp. 117-128 (in Russian).

Koushanfar F., Qu G. Hardware metering // Proceedings of the 38th Design Automation Conference. – 2001. – pp. 490-493.

Koushanfar F. Hardware metering: A survey // Introduction to Hardware Security and Trust / M. Tehranipoor, C. Wang (eds.). – N. Y.: Springer. – 2012. – Ch. 5. – pp. 103-122.

Kolomov, D.; Zolotukho, R. Use of the special memory chips for the FPGA copy protection // Components and technologies. – 2008. – № 12. – pp. 24-26 (in Russian).

Herder Ch., Yu M-D., Koushanfar F., Devadas S. Physical Unclonable Functions and Applications: A Tutorial // Proceedings of the IEEE. – 2014. – Vol. 102, № 8. – pp. 1126-1141.

Belsky V., Chizhov I., Chichaeva A., Shishkin V. Physically Unclonable Functions in cryptography // International Journal of Open Information Technologies. – 2020. – Vol. 8, № 10. – pp. 10-26 (in Russian).

Komleva E.R., Nikiforov M.B. Physical unclonable functions. Problems and prospects. // Izvestia Tula State University. Technical Sciences. – 2021. – № 6. – pp. 61-69 (in Russian).

Ivanyuk, A.A., Zalivako, S.S. Physical cryptography and protection of digital devices // Reports of BSUIR. – 2019. – № 2. – pp. 50-58 (in Russian).

Boronnikov A.S., Demenkova T.A. Methodology for designing unique identifiers of integrated circuits on FPGA // Fundamental, search, applied research and innovative projects. Collection of proceedings of the National Scientific and Practical Conference. – 2023. – pp. 6-11 (in Russian).

Lebedev V.R., Pevtsov E.Ph., Demenkova T.A., Maleto M.I., Filimonov V.V. Method for studying the implementation of Physical Unclonable Function in information systems // International Journal of Open Information Technologies. – 2024. – Vol. 12, №1. – pp. 28-36 (in Russian).

Principle of operation of RSLOS [Online]. Available: https://habr.com/ru/articles/534732/

Fedorets V.N., Belov E.N., Balybin S.V. Technologies of protection of microchips from reverse engineering in the context of information security. – Moscow: Advertising and publishing center "Technosphere" – 2019. – 216 pp (in Russian).

Semyonov A. V. V., Kostyuk A. V. Protection of chip keys on physically unclonable functions in the context of distrust in silicon fab // Information Protection Issues. – 2015. – № 2 (109) – pp. 63-68 (in Russian).

Rührmair U., Devadas S., Koushanfar F. (2012). Security Based on Physical Unclonability and Disorder // Introduction to Hardware Security and Trust / M. Tehranipoor, C. Wang (eds.). – N. Y.: Springer. – 2012. – Ch. 4. – pp. 65-102.

Wei Sh., Nahapetian A., Potkonjak M. Robust passive hardware metering // 2011 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). – 2011. – pp. 802-809.

Leest V., Tuyls P. Anti-counterfeiting with hardware intrinsic security // 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE). – 2013. – pp. 1137-1142.

Guin U., Forte D., Tehranipoor M. Anti-counterfeit Techniques: From Design to Resign // 2013 14th International Workshop on Microprocessor Test and Verification. – 2013. – pp. 89-94.

Koushanfar F. Active Hardware Metering by Finite State Machine Obfuscation // Hardware Protection through Obfuscation / D. Forte et al. (eds.). – N. Y.: Springer. – 2017. – Ch. 7. – pp. 161-187.

Semenov Yu.A. Correction of errors [Online]. Available: http://book.itep.ru/2/28/corec_28.htm

Zalivako S.S., Ivanyuk A.A. Review of methods of active identification of digital devices // Informatics. – 2016. – № 3. – pp. 38-48 (in Russian).

Boronnikov A.S., Demenkova T.A., Kryakhtunov G.M. Hardware-software system for investigation of the physically unclonable functions in the FPGA basis // IT-Standard. – 2024. – № 1(38). – pp. 34-54 (in Russian).

Protection of microchips from reverse-engineering and tampering [Online]. Available: https://habr.com/ru/articles/436998/


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность MoNeTec 2024

ISSN: 2307-8162