Skip to main content

Showing 1–4 of 4 results for author: Sachdev, M

.
  1. arXiv:2207.11181  [pdf, other

    cs.CR eess.SY

    Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR

    Authors: Kleber Stangherlin, Zhuanhao Wu, Hiren Patel, Manoj Sachdev

    Abstract: We propose a secure and lightweight key based challenge obfuscation for strong PUFs. Our architecture is designed to be resilient against learning attacks. Our obfuscation mechanism uses non-linear feedback shift registers (NLFSRs). Responses are directly provided to the user, without error correction or extra post-processing steps. We also discuss the cost of protecting our architecture against p… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

  2. arXiv:2206.11840  [pdf, other

    cs.CR eess.SY

    Design Exploration and Security Assessment of PUF-on-PUF Implementations

    Authors: Kleber Stangherlin, Zhuanhao Wu, Hiren Patel, Manoj Sachdev

    Abstract: We design, implement, and assess the security of several variations of the PUF-on-PUF (POP) architecture. We perform extensive experiments with deep neural networks (DNNs), showing results that endorse its resilience to learning attacks when using APUFs with 6, or more, stages in the first layer. Compositions using APUFs with 2, and 4 stages are shown vulnerable to DNN attacks. We reflect on such… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

  3. arXiv:2206.03440  [pdf, other

    eess.SY cs.CR

    Enhancing Strong PUF Security with Non-monotonic Response Quantization

    Authors: Kleber Stangherlin, Zhuanhao Wu, Hiren Patel, Manoj Sachdev

    Abstract: Strong physical unclonable functions (PUFs) provide a low-cost authentication primitive for resource constrained devices. However, most strong PUF architectures can be modeled through learning algorithms with a limited number of CRPs. In this paper, we introduce the concept of non-monotonic response quantization for strong PUFs. Responses depend not only on which path is faster, but also on the di… ▽ More

    Submitted 11 June, 2022; v1 submitted 7 June, 2022; originally announced June 2022.

  4. arXiv:2205.05095  [pdf, other

    cs.CR cs.AR eess.SY

    Design and Implementation of a Secure RISC-V Microprocessor

    Authors: Kleber Stangherlin, Manoj Sachdev

    Abstract: Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected devices. Traditional counter-measures have limited scope of protection, and impose several restrictions on how sensitive data must be manipulated. We demonstrate a bit-serial RISC-V microprocessor implementation with no plain-text data. All values are protected using Boolean masking. Software can r… ▽ More

    Submitted 3 October, 2022; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: Submitted to IEEE for possible publication. Copyright may be transferred. This version may no longer be accessible