SlideShare a Scribd company logo
1 of 26
8 July 2017
1
A PUF-FSM Binding Scheme for FPGA IP
Protection and Pay-Per Device licensing
Submitted by;
ELIZABETH MATHEW
S1 M.Tech EC
Guide:
Er. NIA ACHU ISSAC
Assistant professor
ECE Department
CKC Manoor
CKC MANOOR MTECH EC
CONTENTS
 Introduction
 Existing Scheme.
 Limitations of existing scheme.
 Technologies used.
 Working.
 Advantages.
 Disadvantages.
 Future scope.
 Conclusion.
2
CKC MANOOR MTECH EC
8 July 2017
INTRODUCTION
 Novel IP protection
 Restrict IP’S execution only on Specific FPGA devices.
 Protect IP’S from cloning/copying.
 Counterfeits avoided.
 First non encryption based HWIP binding
method
3CKC MANOOR MTECH EC
8 July 2017
TRADITIONAL BINDING SCHEME
 Secret key in on-chip memory.
 Cryptography used to authenticate an IC.
4
IC with
a secret key
Sends a random number
Sign the number with a secret key
Only the IC’s key can generate
a valid signature
CKC MANOOR MTECH EC
8 July 2017
EXISTING METHODS
 Bit-stream encryption.
 Advanced encryption standard (AES) core.
 Keyed-hash message authentication code (HMAC) core.
 Triple data encryption standard (3DES).
5
CKC MANOOR MTECH EC
8 July 2017
LIMITATIONS OF EXISTING METHODS
 No solution-: pay-per-device licensing requirement.
 Security vulnerabilities.
 On-chip modules needed.
 Not appropriate for resource-limited environments
 Allows attackers to attack at any time.
 Expensive and insecure.
 Damage brand reputation.
6
CKC MANOOR MTECH EC
8 July 2017
PROPOSED SYSTEM
 Binds FSM with PUF.
 Unique ID for each device.
 Secure.
 No secret key storage.
7CKC MANOOR MTECH EC
8 July 2017
8 July 2017
8
TECHNOLOGIES USED
PUF?
FSM?
FPGA?
IP?
9
8 July 2017
FIELD PROGRAMMABLE GATE
ARRAY
 Popular design platform
 Low NRE cost
 Shorter time to market
 Reprogrammable
 High flexibility
 Can implement any digital system
 Faster and cheaper design.
10
CKC MANOOR MTECH EC
8 July 2017
INTELLECTUAL PROPERTY(IP)
 Creations of the intellect.
 Monopoly is assigned to designated
owners by law.
 Law includes copyright, patent.
 Layout design, trade secrets.
11
CKC MANOOR MTECH EC
8 July 2017
FINITE STATE MACHINE (FSM)
 Popular model.
 Bind HWIPs to the FPGAs with PUFs
 Outputs depend on present input & history of the input.
 Finite number of states.
12
CKC MANOOR MTECH EC
8 July 2017
THE BINDING FSM STRUCTURE
13
CKC MANOOR MTECH EC
8 July 2017
PUF-PHYSICAL UNCLONABLE
FUNCTION
 Digital fingerprint.
 Persistent.
 Unpredictable.
 Unclonable.
 Tamper evident.
 Low cost.
14
CKC MANOOR MTECH EC
8 July 2017
PARTIES INVOLVED IN HWIP BINDING
 FPGA Vendor (FV)
 System Developer (SD)
 IP Core Vendor (CV)
 End User (EU)
15
CKC MANOOR MTECH EC
8 July 2017
WORKING
 FPGA Device Enrollment.
 Hardware IP Core Enrollment and Distribution
 Hardware IP Core Licensing.
 Product Licensing.
16
CKC MANOOR MTECH EC
8 July 2017
FPGA DEVICE ENROLLMENT
17
CKC MANOOR MTECH EC
8 July 2017
HARDWARE IP CORE ENROLLMENT AND
DISTRIBUTION
18
CKC MANOOR MTECH EC
8 July 2017
HARDWARE IP CORE LICENSING:
19
CKC MANOOR MTECH EC
8 July 2017
PRODUCT LICENSING
20
CKC MANOOR MTECH EC
8 July 2017
ADVANTAGES
 Protect both single FPGA configurations and third-party
FPGA IP cores.
 Supports the pay-per-device licensing mechanism.
 No permanent storage for secret keys in the FPGA.
21
CKC MANOOR MTECH EC
8 July 2017
DISADVANTAGES
 Design components without bound FSMs will
still be vulnerable to tamping attacks.
 Vulnerable to side channel attacks
22
CKC MANOOR MTECH EC
8 July 2017
FUTURE SCOPE
 Can introduce more secure protection mechanism
 Combined with anti-tamper methods.
 Appropriate countermeasures for side channel effects.
 Make applicable to high-speed designs that do not have
FSMs
23
CKC MANOOR MTECH EC
8 July 2017
CONCLUSION
 Enables binding hardware IPs to specific FPGAs utilizing the
PUF and the FSM.
 Protect the third-party FPGA IP cores
 Supports the pay-per-device licensing mechanism.
 Low hardware cost.
24
CKC MANOOR MTECH EC
8 July 2017
REFERENCE
 Jiliang zhang, Yaping Lin ”A PUF-FSM binding scheme for FPGA IP
Protection and pay-per-device licensing”IEEE Transactions on information
forensics and security, vol. 10, no. 6, june 2015 1137
 J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Physical
unclonable functions and public-key crypto for FPGA IP protection,”in
Proc. Int. Conf. Field Program. Logic Appl. (FPL), Aug. 2007,pp. 189–
195.
 Z. Paral and S. Devadas, “Reliable and efficient PUF-based key
generationusing pattern matching,” in Proc. IEEE Int. Symp. Hardw.-
Oriented Secur. Trust (HOST), Jun. 2011, pp. 128–133.
25
CKC MANOOR MTECH EC
8 July 2017
THANK YOU
26
CKC MANOOR MTECH EC
8 July 2017

More Related Content

What's hot

Different df fs in vhdl
Different df fs in vhdlDifferent df fs in vhdl
Different df fs in vhdlVan Loi Le
 
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...MediaTek Labs
 
HiPEAC 2019 Workshop - Hardware Starter Kit Agri
HiPEAC 2019 Workshop - Hardware Starter Kit Agri HiPEAC 2019 Workshop - Hardware Starter Kit Agri
HiPEAC 2019 Workshop - Hardware Starter Kit Agri Tulipp. Eu
 
RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...
RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...
RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...RISC-V International
 
RISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V International
 
智慧城市通用交通資訊端點系統
智慧城市通用交通資訊端點系統智慧城市通用交通資訊端點系統
智慧城市通用交通資訊端點系統艾鍗科技
 
side-channel-kevin2600
side-channel-kevin2600side-channel-kevin2600
side-channel-kevin2600Kevin2600
 
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...Paris Open Source Summit
 
Bosch Connected Experience - Sigfox Presentation
Bosch Connected Experience - Sigfox PresentationBosch Connected Experience - Sigfox Presentation
Bosch Connected Experience - Sigfox PresentationNicolas Lesconnec
 

What's hot (13)

Different df fs in vhdl
Different df fs in vhdlDifferent df fs in vhdl
Different df fs in vhdl
 
SDN-architecture
SDN-architectureSDN-architecture
SDN-architecture
 
Porting tock to open titan
Porting tock to open titanPorting tock to open titan
Porting tock to open titan
 
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
 
HiPEAC 2019 Workshop - Hardware Starter Kit Agri
HiPEAC 2019 Workshop - Hardware Starter Kit Agri HiPEAC 2019 Workshop - Hardware Starter Kit Agri
HiPEAC 2019 Workshop - Hardware Starter Kit Agri
 
RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...
RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...
RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...
 
TULIPP Starter Kit – AGRI
TULIPP Starter Kit – AGRITULIPP Starter Kit – AGRI
TULIPP Starter Kit – AGRI
 
RISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmware
 
智慧城市通用交通資訊端點系統
智慧城市通用交通資訊端點系統智慧城市通用交通資訊端點系統
智慧城市通用交通資訊端點系統
 
side-channel-kevin2600
side-channel-kevin2600side-channel-kevin2600
side-channel-kevin2600
 
VF360 OpenVPX Board w. Altera Stratix and TI KeyStone DSP
VF360 OpenVPX Board w. Altera Stratix and TI KeyStone DSPVF360 OpenVPX Board w. Altera Stratix and TI KeyStone DSP
VF360 OpenVPX Board w. Altera Stratix and TI KeyStone DSP
 
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
 
Bosch Connected Experience - Sigfox Presentation
Bosch Connected Experience - Sigfox PresentationBosch Connected Experience - Sigfox Presentation
Bosch Connected Experience - Sigfox Presentation
 

Similar to A PUF-FSM Binding Scheme for FPGA IP PROTECTION

FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONFROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONieijjournal
 
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONFROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONieijjournal
 
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONFROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONieijjournal1
 
“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...
“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...
“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...Edge AI and Vision Alliance
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowiaemedu
 
NGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentationNGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentationVEDLIoT Project
 
Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...
Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...
Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...KTN
 
FPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionFPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionPersiPersi1
 
Brochure (2016-01-30)
Brochure (2016-01-30)Brochure (2016-01-30)
Brochure (2016-01-30)Jonah McLeod
 
⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA
⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA
⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGAVictor Asanza
 
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...Linaro
 
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...PT Datacomm Diangraha
 
Versal Premium ACAP for Network and Cloud Acceleration
Versal Premium ACAP for Network and Cloud AccelerationVersal Premium ACAP for Network and Cloud Acceleration
Versal Premium ACAP for Network and Cloud Accelerationinside-BigData.com
 
MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...
MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...
MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...MIPI Alliance
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingMichelle Holley
 
Synopsys User Group Presentation
Synopsys User Group PresentationSynopsys User Group Presentation
Synopsys User Group Presentationemlawgr
 

Similar to A PUF-FSM Binding Scheme for FPGA IP PROTECTION (20)

FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONFROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
 
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONFROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
 
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONFROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
 
“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...
“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...
“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 
How PUF Technology is Securing Io
How PUF Technology is Securing IoHow PUF Technology is Securing Io
How PUF Technology is Securing Io
 
NGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentationNGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentation
 
Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...
Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...
Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...
 
FPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionFPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusion
 
Brochure (2016-01-30)
Brochure (2016-01-30)Brochure (2016-01-30)
Brochure (2016-01-30)
 
⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA
⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA
⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA
 
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
 
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
 
Versal Premium ACAP for Network and Cloud Acceleration
Versal Premium ACAP for Network and Cloud AccelerationVersal Premium ACAP for Network and Cloud Acceleration
Versal Premium ACAP for Network and Cloud Acceleration
 
Iaetsd near field
Iaetsd near fieldIaetsd near field
Iaetsd near field
 
MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...
MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...
MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet Processing
 
Synopsys User Group Presentation
Synopsys User Group PresentationSynopsys User Group Presentation
Synopsys User Group Presentation
 
Resume
ResumeResume
Resume
 
Research Paper
Research PaperResearch Paper
Research Paper
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 

A PUF-FSM Binding Scheme for FPGA IP PROTECTION

  • 1. 8 July 2017 1 A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per Device licensing Submitted by; ELIZABETH MATHEW S1 M.Tech EC Guide: Er. NIA ACHU ISSAC Assistant professor ECE Department CKC Manoor CKC MANOOR MTECH EC
  • 2. CONTENTS  Introduction  Existing Scheme.  Limitations of existing scheme.  Technologies used.  Working.  Advantages.  Disadvantages.  Future scope.  Conclusion. 2 CKC MANOOR MTECH EC 8 July 2017
  • 3. INTRODUCTION  Novel IP protection  Restrict IP’S execution only on Specific FPGA devices.  Protect IP’S from cloning/copying.  Counterfeits avoided.  First non encryption based HWIP binding method 3CKC MANOOR MTECH EC 8 July 2017
  • 4. TRADITIONAL BINDING SCHEME  Secret key in on-chip memory.  Cryptography used to authenticate an IC. 4 IC with a secret key Sends a random number Sign the number with a secret key Only the IC’s key can generate a valid signature CKC MANOOR MTECH EC 8 July 2017
  • 5. EXISTING METHODS  Bit-stream encryption.  Advanced encryption standard (AES) core.  Keyed-hash message authentication code (HMAC) core.  Triple data encryption standard (3DES). 5 CKC MANOOR MTECH EC 8 July 2017
  • 6. LIMITATIONS OF EXISTING METHODS  No solution-: pay-per-device licensing requirement.  Security vulnerabilities.  On-chip modules needed.  Not appropriate for resource-limited environments  Allows attackers to attack at any time.  Expensive and insecure.  Damage brand reputation. 6 CKC MANOOR MTECH EC 8 July 2017
  • 7. PROPOSED SYSTEM  Binds FSM with PUF.  Unique ID for each device.  Secure.  No secret key storage. 7CKC MANOOR MTECH EC 8 July 2017
  • 10. FIELD PROGRAMMABLE GATE ARRAY  Popular design platform  Low NRE cost  Shorter time to market  Reprogrammable  High flexibility  Can implement any digital system  Faster and cheaper design. 10 CKC MANOOR MTECH EC 8 July 2017
  • 11. INTELLECTUAL PROPERTY(IP)  Creations of the intellect.  Monopoly is assigned to designated owners by law.  Law includes copyright, patent.  Layout design, trade secrets. 11 CKC MANOOR MTECH EC 8 July 2017
  • 12. FINITE STATE MACHINE (FSM)  Popular model.  Bind HWIPs to the FPGAs with PUFs  Outputs depend on present input & history of the input.  Finite number of states. 12 CKC MANOOR MTECH EC 8 July 2017
  • 13. THE BINDING FSM STRUCTURE 13 CKC MANOOR MTECH EC 8 July 2017
  • 14. PUF-PHYSICAL UNCLONABLE FUNCTION  Digital fingerprint.  Persistent.  Unpredictable.  Unclonable.  Tamper evident.  Low cost. 14 CKC MANOOR MTECH EC 8 July 2017
  • 15. PARTIES INVOLVED IN HWIP BINDING  FPGA Vendor (FV)  System Developer (SD)  IP Core Vendor (CV)  End User (EU) 15 CKC MANOOR MTECH EC 8 July 2017
  • 16. WORKING  FPGA Device Enrollment.  Hardware IP Core Enrollment and Distribution  Hardware IP Core Licensing.  Product Licensing. 16 CKC MANOOR MTECH EC 8 July 2017
  • 17. FPGA DEVICE ENROLLMENT 17 CKC MANOOR MTECH EC 8 July 2017
  • 18. HARDWARE IP CORE ENROLLMENT AND DISTRIBUTION 18 CKC MANOOR MTECH EC 8 July 2017
  • 19. HARDWARE IP CORE LICENSING: 19 CKC MANOOR MTECH EC 8 July 2017
  • 20. PRODUCT LICENSING 20 CKC MANOOR MTECH EC 8 July 2017
  • 21. ADVANTAGES  Protect both single FPGA configurations and third-party FPGA IP cores.  Supports the pay-per-device licensing mechanism.  No permanent storage for secret keys in the FPGA. 21 CKC MANOOR MTECH EC 8 July 2017
  • 22. DISADVANTAGES  Design components without bound FSMs will still be vulnerable to tamping attacks.  Vulnerable to side channel attacks 22 CKC MANOOR MTECH EC 8 July 2017
  • 23. FUTURE SCOPE  Can introduce more secure protection mechanism  Combined with anti-tamper methods.  Appropriate countermeasures for side channel effects.  Make applicable to high-speed designs that do not have FSMs 23 CKC MANOOR MTECH EC 8 July 2017
  • 24. CONCLUSION  Enables binding hardware IPs to specific FPGAs utilizing the PUF and the FSM.  Protect the third-party FPGA IP cores  Supports the pay-per-device licensing mechanism.  Low hardware cost. 24 CKC MANOOR MTECH EC 8 July 2017
  • 25. REFERENCE  Jiliang zhang, Yaping Lin ”A PUF-FSM binding scheme for FPGA IP Protection and pay-per-device licensing”IEEE Transactions on information forensics and security, vol. 10, no. 6, june 2015 1137  J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Physical unclonable functions and public-key crypto for FPGA IP protection,”in Proc. Int. Conf. Field Program. Logic Appl. (FPL), Aug. 2007,pp. 189– 195.  Z. Paral and S. Devadas, “Reliable and efficient PUF-based key generationusing pattern matching,” in Proc. IEEE Int. Symp. Hardw.- Oriented Secur. Trust (HOST), Jun. 2011, pp. 128–133. 25 CKC MANOOR MTECH EC 8 July 2017
  • 26. THANK YOU 26 CKC MANOOR MTECH EC 8 July 2017