首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 218 毫秒
1.
为了克服物理不可克隆函数(PUF)面对建模攻击的脆弱性,该文提出一种基于敏感度混淆机制的控制型PUF架构。根据PUF的布尔函数定义及Walsh谱理论,推导出各个激励位具有不同敏感度,分析并归纳了与混淆值位宽奇偶性有关的位置选取规则。利用该规则指导了多位宽混淆算法(MWCA)的设计,构建了具有高安全性的控制型PUF架构。将基础PUF结构作为控制型PUF的防护对象进行实验评估,发现基于敏感度混淆机制的控制型PUF所产生的响应具有较好的随机性。采用逻辑回归算法对不同PUF结构进行建模攻击,实验结果表明,相比基本ROPUF、仲裁器PUF以及基于随机混淆机制的OB-PUF,基于敏感度混淆机制的控制型PUF能够显著提高PUF的抗建模攻击能力。  相似文献   

2.
近年来硬件安全不断受到挑战,具有不可预测性、随机性等特性的环形振荡器物理不可克隆函数(Ring Oscillator Physical Unclonable Function,RO PUF)可作为硬件安全重要的加密密钥方式,但通常原始RO PUF不满足加密密钥对随机性的要求。因此,提出了基于多项式拟合频率重构的PUF优化方法。首先,实现RO电路的硬宏设计并在现场可编程门阵列(Field Programmable Gate Array,FPGA)上进行实例化,从而获得RO阵列的频率数据;其次,针对原始响应的随机性较差的情况,通过统计分析其分布特征,利用多项式拟合法优化重构RO阵列频率;最后,采用熵密度值评估RO PUF响应的随机性。选用型号为Xilinx Artix 7103的FPGA板进行实验测试评估,结果表明所提方法不仅比原始RO PUF响应的随机性强,而且与随机补丁混合法(Random Patch Mixer,RPM)和基于回归的熵蒸馏法相比也具备更好的随机性。  相似文献   

3.
物理不可克隆函数(Physical Unclonable Function, PUF)在信息安全领域具有极其重要的应用前景,然而也存在其自身安全受机器学习攻击等方面的不足。该文通过对PUF电路和密码算法的研究,提出一种基于序列密码的强PUF抗机器学习攻击方法。首先,通过构造滚动密钥生成器产生随机密钥,并与输入激励进行混淆;然后,将混淆后的激励通过串并转换电路作用于强PUF,产生输出响应;最后,利用Python软件仿真和FPGA硬件实现,并分析其安全性和统计特性。实验结果表明,当建模所用激励响应对(Challenge Response Pairs, CRPs)高达106组时,基于逻辑回归、人工神经网络和支持向量机的攻击预测率接近50%的理想值。此外,该方法通用性强、硬件开销小,且不影响PUF的随机性、唯一性以及可靠性。  相似文献   

4.
为了验证物理不可克隆函数(Physical Unclonable Function, PUF)的有效性,试验必须针对大量芯片的微延迟特性进行建模。尽管仿真的方式能够提供近似的结果,但通过片上试验能获得更加精确的结果。借助FPGA工具制造硬宏,在多块同型号FPGA上分析了基于环形振荡器(Ring Oscillator, RO)的物理不可克隆函数。其核心步骤是通过对相邻RO的振荡频率计数后相互比较,得到1024比特长度的响应输出。在多次试验测试后,得到了片内和片间汉明距,并作为PUF性能的指标参数——唯一性、可靠性。结果表明,常温下的平均唯一性为48.01%,平均可靠性为1.75%。  相似文献   

5.
物理不可克隆函数(Physical Unclonable Function,PUF)在信息安全领域具有极其重要的应用前景,然而也存在其自身安全受机器学习攻击等方面的不足.该文通过对PUF电路和密码算法的研究,提出一种基于序列密码的强PUF抗机器学习攻击方法.首先,通过构造滚动密钥生成器产生随机密钥,并与输入激励进行混淆;然后,将混淆后的激励通过串并转换电路作用于强PUF,产生输出响应;最后,利用Python软件仿真和FPGA硬件实现,并分析其安全性和统计特性.实验结果表明,当建模所用激励响应对(Challenge Response Pairs,CRPs)高达106组时,基于逻辑回归、人工神经网络和支持向量机的攻击预测率接近50%的理想值.此外,该方法通用性强、硬件开销小,且不影响PUF的随机性、唯一性以及可靠性.  相似文献   

6.
电子琴与各种传统乐器的根本差异,在于乐音的产生方法不同.所以,音源电路是电子琴中最重要、最基本的电路.早期的能同时发出多个乐音的电子琴,设置有许多个振荡频率分别与各乐音音高(频率)相对应的振荡器,由安装在琴键下面的键开关的通断来控制振荡器发音.这种电子琴的最大缺点是容易走音.这是因为,由于温度和元件老化等因素,振荡器的振荡频率不可  相似文献   

7.
物理不可克隆函数(PUF)将集成电路制造过程中产生的工艺变化作为一种安全原语,已被广泛应用于硬件安全领域,特别是身份认证和密钥存储。提出了一种基于阻变存储器(RRAM)阵列的PUF优化设计,采用2T2R差分存储结构,并利用阵列中RRAM单元的阻值变化产生PUF的随机性,以实现更高安全级别所需的大量激励-响应对(CRP)。RRAM PUF的存储单元基于28 nm工艺实现,其面积仅为0.125μm2,相比传统PUF存储单元面积开销减小,在入侵和侧信道攻击方面具有更好的鲁棒性。实验数据表明,RRAM PUF唯一性达到了约49.78%,片内汉明距离为0%,一致性良好,具有较好的随机性。  相似文献   

8.
本文分析了基于有源全通网络的多相正弦振荡器所特有的多频率振荡问题,得到了不同n值所对应的各振荡频率。给出了消除k>1振荡的方法和相位补偿电容(C1、C2)之间必须满足的关系,讨论了非理想运算放大器时的振荡频率,测试了三相和四相正弦振荡器,用PSPICE仿真了五相和六相正弦振荡器,实验和仿真结果与理论分析相符。  相似文献   

9.
刘伟强  崔益军  王成华 《电子学报》2016,44(7):1772-1776
物理不可克隆函数(PUF:Physical Unclonable Function)是一种新型的加密组件,具有防伪、不可克隆及不可预测等特性。本文提出了一种新型的低成本PUF,与传统PUF相比更适用于无线射频识别(Radio Frequency Iden-tification,RFID)系统。该PUF结构主要由上电密钥生成器和混合函数两部分构成。上电密钥生成器由比特生成器阵列构成,混合函数则由低成本流加密算法构成,其作用是隐藏密钥生成器,以提高安全性。此外,本文还提出了择多模块和多寻认证协议来改善PUF响应及其在RFID系统中的稳定性。实验表明,该PUF的硬件成本低并且具有很好的稳定性,非常适用于RFID系统等资源受限的应用场合。  相似文献   

10.
新颖的基于MOCCCII的多相位正弦振荡器   总被引:1,自引:1,他引:0  
提出了一种用多输出电流控制传输器(MOCCCII)实现的多相位正弦波振荡器.设计出的振荡器能同时产生n相等幅等相差的正弦电流和电压信号.振荡条件和振荡频率独立可调.电路结构简单,PSPICE仿真结果验证了理论分析的正确性.  相似文献   

11.
Physical Unclonable Functions (PUFs) are promising hardware security primitives which produce unique signatures. Out of several delay based PUF circuits, Configurable Ring Oscillator (CRO) PUF has got higher uniqueness and it is resilient against modelling attacks. In this paper, we present a novel Current controlled CRO (C-CRO) PUF in which inverters of RO uses different logic styles: static CMOS and Feedthrough logic (FTL). Use of different logic styles facilitates improvement of security metrics of PUF. The analysis of security metrics of the proposed architecture is carried out in 90 nm CMOS technology shows, using FTL logic leads to better security metrics. Proposed C-CRO PUF is also both power and area efficient. Further, in order to measure the vulnerability of proposed PUF, machine learning attack is carried out and the result shows FTL RO based C-CRO PUF is highly resilient to machine learning attack because of its non-linearity property.  相似文献   

12.
With the increasing need for highly secure systems, Physical Unclonable Functions (PUFs) have emerged within the last decade. Ordering based Ring Oscillator (RO) PUFs are one of the best performing structures with their robustness and suitability to FPGA implementations. Even though the performance of the ordering based RO-PUFs have been analyzed in detail, effects of aging have not been studied before. In this work, we present the results of an accelerated aging test applied to analyze the effects of aging on ROs. Then, the effects of aging on ordering based RO-PUFs are examined. Finally, a compensation method to protect the 100% robustness claim of the PUF structure is proposed and its influence on the circuit performance is presented.  相似文献   

13.
We fabricated organic ring oscillators (ROs) on a flexible substrate and utilized them as the core circuit of a physically unclonable function (PUF). An RO-PUF is a security primitive that generates unique identification numbers (IDs) by extracting the frequency variation of the RO. We fabricated two RO-PUFs and evaluated their IDs in terms of stability and uniqueness at various operating voltages. The experimental results indicate that our RO-PUFs have a high degree of uniqueness and exhibit good stability relative to voltage fluctuations with a nominal operating voltage below 2 V.  相似文献   

14.
物理不可克隆函数(PUF)作为一种可有效地应对硬件安全问题的电路结构,在近些年得到了广泛的关注.环形振荡器(RO)PUF由于不需要完全对称的布线方式,因此被认为是最理想的PUF结构之一.现有的ROPUF设计愈加复杂且需要"硬宏"来固定电路,这导致PUF的移植性很差.文章利用FPGA中固有的进位逻辑资源实现RO PUF,...  相似文献   

15.
Laser voltage probing (LVP) provides signal levels from circuit nodes through the backside of integrated circuits. Previous investigations presented voltage sweeping and modulation mapping, based on CW (continuous wave) 1319 nm laser. In this paper, large device structures have been compared with results of measurements on sub-micron devices – having nominal gate lengths and widths – including a ring oscillator (RO). All signals were obtained with a spectrum analyzer, requiring no internal trigger signals from the circuitry. On ROs, frequency shifts due to the thermal stimulation effect could be determined. Furthermore, a new measurement scheme for sign measurements of LVP signals is introduced.  相似文献   

16.
In this paper, we analyze ring oscillator (RO) based physical unclonable function (PUF) on FPGAs. We show that the systematic process variation adversely affects the ability of the RO-PUF to generate unique chip-signatures, and propose a compensation method to mitigate it. Moreover, a configurable ring oscillator (CRO) technique is proposed to reduce noise in PUF responses. Our compensation method could improve the uniqueness of the PUF by an amount as high as 18%. The CRO technique could produce nearly 100% error-free PUF outputs over varying environmental conditions without post-processing while consuming minimum area.  相似文献   

17.
In this study, a new concept of physical unclonable functions (PUFs) is introduced comprising reduced graphene oxide (GO) materials. To create a disordered conductivity distribution, two types of GO are used: HGO, are produced by the conventional Hummers’ method, and PGO, produced by Brodie's method with an additional unique purification procedure. It is found that PGO becomes graphene-like after room-temperature chemical reduction. These two reduced GOs have a distinct conductivity difference of up to 104 times. By blending these two materials, a random mixture is created that can generate a highly unpredictable electrical signal, serving as an ideal security key with strong randomness and uniqueness. The optimized PUF device, based on this approach, demonstrates excellent performance in generating secure keys.  相似文献   

18.
硬件木马是一种在特定条件下使集成电路失效或泄露机密信息等的恶意电路,给现代信息系统带来了严重的安全隐患。该文基于硬件木马在芯片工作之初造成的温度响应特征,提出一种利用芯片温度变化特性并进行比对的硬件木马检测方法。该方法采用环形振荡器作为片内温度特征测量传感器,提取温度变化特征信息,并采用曲线拟合评价指标来评估硬件木马对温度变化特征的影响,通过比对无木马芯片温度响应特征从而完成木马检测。通过对10个不同芯片的检测,结果表明该方法能够对面积消耗32个逻辑单元硬件木马的检测率达到100%,对16个逻辑单元检测概率也能达到90%;同时检测结果表明该方法完成硬件木马检测后,能够对硬件木马的植入位置进行粗定位。  相似文献   

19.
After the liberalization of information and communication technology (ICT) markets many potential providers have appeared. Thus, business complexity, for ICT decision makers, has increased. In this paper, we focus on the problem of selecting the optimal business evolution path for ICT, focusing on the broadband technology (BT) field. Traditional quantitative cost–benefits analysis, such as net present value (NPV), is by no means sufficient for capturing the complexity of the problem in its entire. Researchers suggest the real options (ROs) for valuating ICT investments. However, RO models are strictly quantitative and very often ICT investments may also contain qualitative factors, which cannot be quantified in monetary terms. In addition, ROs analysis itself brings to the “surface” some factors that can be more efficiently treated qualitatively. We combine the ROs and analytic hierarchy process (AHP) into a common decision analysis framework providing an integrated multicriteria model, called ROAHP, for prioritizing ICT business alternatives. The proposed model is applied to a real life BT business case, showing how it can be formulated and solved.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号