Reconfigurable Binding against FPGA Replay Attacks
- 2 March 2015
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Design Automation of Electronic Systems
- Vol. 20 (2), 1-20
- https://doi.org/10.1145/2699833
Abstract
The FPGA replay attack, where an attacker downgrades an FPGA-based system to the previous version with known vulnerabilities, has become a serious security and privacy concern for FPGA design. Current FPGA intellectual property (IP) protection mechanisms target the protection of FPGA configuration bitstreams by watermarking or encryption or binding. However, these mechanisms fail to prevent replay attacks. In this article, based on a recently reported PUF-FSM binding method that protects the usage of configuration bitstreams, we propose to reconfigure both the physical unclonable functions (PUFs) and the locking scheme of the finite state machine (FSM) in order to defeat the replay attack. We analyze the proposed scheme and demonstrate how replay attack would fail in attacking systems protected by the reconfigurable binding method. We implement two ways to build reconfigurable PUFs and propose two practical methods to reconfigure the locking scheme. Experimental results show that the two reconfigurable PUFs can generate significantly distinct responses with average reconfigurability of more than 40%. The reconfigurable locking schemes only incur a timing overhead less than 1%.Keywords
Funding Information
- National Natural Science Foundation of China (61173038 and 61228204)
- the scholarship from China Scholarship Council (201306130042)
This publication has 33 references indexed in Scilit:
- A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device LicensingIEEE Transactions on Information Forensics and Security, 2015
- A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFsJournal of Computer Science and Technology, 2014
- Countering the effects of silicon aging on SRAM PUFsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- PUFKY: A Fully Functional PUF-Based Cryptographic Key GeneratorLecture Notes in Computer Science, 2012
- Efficient verification of IP watermarks in FPGA designs through lookup table content extractingIEICE Electronics Express, 2012
- Recyclable PUFs: logically reconfigurable PUFsJournal of Cryptographic Engineering, 2011
- Techniques for Design and Implementation of Secure Reconfigurable PUFsACM Transactions on Reconfigurable Technology and Systems, 2009
- FPGA Intrinsic PUFs and Their Use for IP ProtectionLecture Notes in Computer Science, 2007
- Physical unclonable functions for device authentication and secret key generationProceedings of the 39th conference on Design automation - DAC '02, 2007
- Offline Hardware/Software Authentication for Reconfigurable PlatformsLecture Notes in Computer Science, 2006