System-of-PUFs: Multilevel security for embedded systems

S. T.Choden Konigsmark, Leslie K. Hwang, Deming Chen, Martin D F Wong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Embedded systems continue to provide the core for a wide range of applications, from smart-cards for mobile payment to smart-meters for power-grids. The resource and power dependency of embedded systems continues to be a challenge for state-of-the-art security practices. Moreover, even theoretically secure algorithms are often vulnerable in their implementation. With decreasing cost and complexity, physical attacks are an increasingly important threat. This threat led to the development of Physically Unclonable Functions (PUFs) which are disordered physical systems with various applications in hardware security. However, consistent security oriented design of embedded systems remains a challenge, as most formalizations and security models are concerned with isolated physical components or high-level concept. We provide four unique contributions: (i) We propose a system-level security model to overcome the chasm between secure components and requirements of high-level protocols; this enables synergy between component-oriented security formalizations and theoretically proven protocols. (ii) An analysis of current practices in PUF protocols using the proposed system-level security model; we identify significant issues and expose assumptions that require costly security techniques. (iii) A System-of-PUF (SoP) that utilizes the large PUF design-space to achieve security requirements with minimal resource utilization; SoP requires 64% less gate-equivalent units than recently published schemes. (iv) A multilevel authentication protocol based on SoP which is validated using our system-level security model and which overcomes current vulnerabilities. Furthermore, this protocol offers breach recognition and recovery. Copyright is held by the owner/author(s).

Original languageEnglish (US)
Title of host publication2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014
PublisherAssociation for Computing Machinery, Inc
ISBN (Electronic)9781450330510
DOIs
StatePublished - Oct 12 2014
Event2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014 - New Delhi, India
Duration: Oct 12 2014Oct 17 2014

Publication series

Name2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014

Other

Other2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014
CountryIndia
CityNew Delhi
Period10/12/1410/17/14

Fingerprint

Embedded systems
Computer systems
Smart meters
Smart cards
Authentication
Recovery
Costs

Keywords

  • Hardware authentication
  • Physically unclonable functions

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture

Cite this

Konigsmark, S. T. C., Hwang, L. K., Chen, D., & Wong, M. D. F. (2014). System-of-PUFs: Multilevel security for embedded systems. In 2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014 [a27] (2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014). Association for Computing Machinery, Inc. https://doi.org/10.1145/2656075.2656099

System-of-PUFs : Multilevel security for embedded systems. / Konigsmark, S. T.Choden; Hwang, Leslie K.; Chen, Deming; Wong, Martin D F.

2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014. Association for Computing Machinery, Inc, 2014. a27 (2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Konigsmark, STC, Hwang, LK, Chen, D & Wong, MDF 2014, System-of-PUFs: Multilevel security for embedded systems. in 2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014., a27, 2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014, Association for Computing Machinery, Inc, 2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014, New Delhi, India, 10/12/14. https://doi.org/10.1145/2656075.2656099
Konigsmark STC, Hwang LK, Chen D, Wong MDF. System-of-PUFs: Multilevel security for embedded systems. In 2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014. Association for Computing Machinery, Inc. 2014. a27. (2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014). https://doi.org/10.1145/2656075.2656099
Konigsmark, S. T.Choden ; Hwang, Leslie K. ; Chen, Deming ; Wong, Martin D F. / System-of-PUFs : Multilevel security for embedded systems. 2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014. Association for Computing Machinery, Inc, 2014. (2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014).
@inproceedings{4487ff0acaf54c26911fa80f367d94bd,
title = "System-of-PUFs: Multilevel security for embedded systems",
abstract = "Embedded systems continue to provide the core for a wide range of applications, from smart-cards for mobile payment to smart-meters for power-grids. The resource and power dependency of embedded systems continues to be a challenge for state-of-the-art security practices. Moreover, even theoretically secure algorithms are often vulnerable in their implementation. With decreasing cost and complexity, physical attacks are an increasingly important threat. This threat led to the development of Physically Unclonable Functions (PUFs) which are disordered physical systems with various applications in hardware security. However, consistent security oriented design of embedded systems remains a challenge, as most formalizations and security models are concerned with isolated physical components or high-level concept. We provide four unique contributions: (i) We propose a system-level security model to overcome the chasm between secure components and requirements of high-level protocols; this enables synergy between component-oriented security formalizations and theoretically proven protocols. (ii) An analysis of current practices in PUF protocols using the proposed system-level security model; we identify significant issues and expose assumptions that require costly security techniques. (iii) A System-of-PUF (SoP) that utilizes the large PUF design-space to achieve security requirements with minimal resource utilization; SoP requires 64{\%} less gate-equivalent units than recently published schemes. (iv) A multilevel authentication protocol based on SoP which is validated using our system-level security model and which overcomes current vulnerabilities. Furthermore, this protocol offers breach recognition and recovery. Copyright is held by the owner/author(s).",
keywords = "Hardware authentication, Physically unclonable functions",
author = "Konigsmark, {S. T.Choden} and Hwang, {Leslie K.} and Deming Chen and Wong, {Martin D F}",
year = "2014",
month = "10",
day = "12",
doi = "10.1145/2656075.2656099",
language = "English (US)",
series = "2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014",
publisher = "Association for Computing Machinery, Inc",
booktitle = "2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014",

}

TY - GEN

T1 - System-of-PUFs

T2 - Multilevel security for embedded systems

AU - Konigsmark, S. T.Choden

AU - Hwang, Leslie K.

AU - Chen, Deming

AU - Wong, Martin D F

PY - 2014/10/12

Y1 - 2014/10/12

N2 - Embedded systems continue to provide the core for a wide range of applications, from smart-cards for mobile payment to smart-meters for power-grids. The resource and power dependency of embedded systems continues to be a challenge for state-of-the-art security practices. Moreover, even theoretically secure algorithms are often vulnerable in their implementation. With decreasing cost and complexity, physical attacks are an increasingly important threat. This threat led to the development of Physically Unclonable Functions (PUFs) which are disordered physical systems with various applications in hardware security. However, consistent security oriented design of embedded systems remains a challenge, as most formalizations and security models are concerned with isolated physical components or high-level concept. We provide four unique contributions: (i) We propose a system-level security model to overcome the chasm between secure components and requirements of high-level protocols; this enables synergy between component-oriented security formalizations and theoretically proven protocols. (ii) An analysis of current practices in PUF protocols using the proposed system-level security model; we identify significant issues and expose assumptions that require costly security techniques. (iii) A System-of-PUF (SoP) that utilizes the large PUF design-space to achieve security requirements with minimal resource utilization; SoP requires 64% less gate-equivalent units than recently published schemes. (iv) A multilevel authentication protocol based on SoP which is validated using our system-level security model and which overcomes current vulnerabilities. Furthermore, this protocol offers breach recognition and recovery. Copyright is held by the owner/author(s).

AB - Embedded systems continue to provide the core for a wide range of applications, from smart-cards for mobile payment to smart-meters for power-grids. The resource and power dependency of embedded systems continues to be a challenge for state-of-the-art security practices. Moreover, even theoretically secure algorithms are often vulnerable in their implementation. With decreasing cost and complexity, physical attacks are an increasingly important threat. This threat led to the development of Physically Unclonable Functions (PUFs) which are disordered physical systems with various applications in hardware security. However, consistent security oriented design of embedded systems remains a challenge, as most formalizations and security models are concerned with isolated physical components or high-level concept. We provide four unique contributions: (i) We propose a system-level security model to overcome the chasm between secure components and requirements of high-level protocols; this enables synergy between component-oriented security formalizations and theoretically proven protocols. (ii) An analysis of current practices in PUF protocols using the proposed system-level security model; we identify significant issues and expose assumptions that require costly security techniques. (iii) A System-of-PUF (SoP) that utilizes the large PUF design-space to achieve security requirements with minimal resource utilization; SoP requires 64% less gate-equivalent units than recently published schemes. (iv) A multilevel authentication protocol based on SoP which is validated using our system-level security model and which overcomes current vulnerabilities. Furthermore, this protocol offers breach recognition and recovery. Copyright is held by the owner/author(s).

KW - Hardware authentication

KW - Physically unclonable functions

UR - http://www.scopus.com/inward/record.url?scp=84910612276&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84910612276&partnerID=8YFLogxK

U2 - 10.1145/2656075.2656099

DO - 10.1145/2656075.2656099

M3 - Conference contribution

AN - SCOPUS:84910612276

T3 - 2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014

BT - 2014 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2014

PB - Association for Computing Machinery, Inc

ER -