Title: Hardware Security: PUF Based Authentication and Functional Obfuscation


Keshab K. Parhi and Chris H. Kim, University of Minnesota, USA


Hardware security has emerged as an important area with respect to protecting intellectual property (IP), preventing reverse engineering, preventing manufacturing of excess parts, and authenticating devices using physical unclonable functions. This tutorial will address two topics: 1) authentication, and 2) functional obfuscation. The authentication-based approaches include physical unclonable functions (PUFs) based authentication, digital watermarking, keylocking and hardware metering. Delay based PUFs include multiplexer PUFs and ring-oscillator PUFs. Memory based PUFs include SRAM and DRAM PUFs. These PUF structures and their models will be discussed. Error correction of PUFs will be discussed. Obfuscation-based approach is a technique that transforms an application or a design into one that is functionally equivalent to the original but is significantly more difficult to reverse engineer. Some hardware protection methods are achieved by altering the human readability of the hardware description language (HDL) code, or by encrypting the source code based on cryptographic techniques. Recently, a number of hardware protection schemes have been proposed that modify the finite-state machine (FSM) representations to obfuscate the circuits. Fixed and dynamic functional obfuscation approaches will be addressed.