SlideShare a Scribd company logo
3
Most read
4
Most read
10
Most read
DIGITAL SECURITY
BY DESIGN
WORKSHOP
GAVIN MCWILLIAMS
Director of Engineering
26 September 2019
Physical
Unclonable
Functions
What is a PUF?
PUF
000000000000
70db46a1208fe753
29d3a6720fc43805
39e01f6290ac89d0
A PUF (Physical Unclonable Function) is a digital circuit that uses manufacturing process
variations to generate a unique digital fingerprint.
No two chips should give the same response when supplied with the same challenge.
Oxide
Doping
Feature
size
Process Variations
PUF Classification: Weak Vs Strong
Weak PUF
• Typically have no (or one fixed) challenge
- e.g. SRAM PUF, Butterfly PUF.
• Assumed an attacker cannot access the
responses of “Weak” PUFs as one or few CRPs
could be used to build a model of the security system
• Applications include:
- Identity generation
- RNG seed
- Non volatile key storage
- Hardware root of trust
- Anti-Cloning
PUF Classification: Weak Vs Strong
Strong PUF
• May have many possible challenge response pairs (CRPs), e.g. Arbiter PUF.
• With access to the CRPs, it should be infeasible to model the system
and determine the CRPs of a strong PUF
• Applications include:
- Challenge-response authentication
- Anti-cloning
FPGA Testbed: 240 Xilinx Zynq devices (ARM Cortex-A9 + Artix-7 FPGA)
www.csit.qub.ac.uk 6
Software PUF
• SRAM PUF on ARM Cortex-M4 processors
www.csit.qub.ac.uk 7
Uniqueness
Source:https://www.arm.com/assets
Source: drprem.com
Ideal uniqueness = 0.5
Key Storage
Fuzzy Commitment
Secure Boot
• Boot without trusting Xilinx
• Bitstream encryption without
blowing fuses
• Or battery backed storage
• Only helper data changes
between devices, the key can
be set the same
Questions
g.mcwilliams@qub.ac.uk

More Related Content

PPTX
PDF
CMOS Topic 7 -_design_methodology
PPT
System On Chip (SOC)
PDF
IRDA Infrared Data Association (IrDA)
PDF
Design and verification environment for amba axi protocol for soc integration
PPTX
The Perfect Linux Security Firewalls
PPT
ODP
axi protocol
CMOS Topic 7 -_design_methodology
System On Chip (SOC)
IRDA Infrared Data Association (IrDA)
Design and verification environment for amba axi protocol for soc integration
The Perfect Linux Security Firewalls
axi protocol

What's hot (20)

PDF
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
PPT
Flash memory
PPTX
PPTX
Real Time OS For Embedded Systems
PPT
Fundamentals of FPGA
PPTX
Quantum Cryptography
PDF
System-on-Chip Design, Embedded System Design Challenges
PPT
Introduction to msp430
PPTX
Core i3,i5,i7 and i9 processors
PPTX
zigbee full ppt
PDF
Sızma Testlerinde Fiziksel Güvenlik Riskleri
PPTX
Ppt seminar noc
DOCX
Abstract of raspberry pi
PPTX
Streaming multiprocessors and HPC
PPT
EEPROM Part-21
PPTX
Security for iot and cloud aug 25b 2017
PPTX
Raspberry Pi
DOCX
UNIT 3.docx
PDF
System On Chip
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
Flash memory
Real Time OS For Embedded Systems
Fundamentals of FPGA
Quantum Cryptography
System-on-Chip Design, Embedded System Design Challenges
Introduction to msp430
Core i3,i5,i7 and i9 processors
zigbee full ppt
Sızma Testlerinde Fiziksel Güvenlik Riskleri
Ppt seminar noc
Abstract of raspberry pi
Streaming multiprocessors and HPC
EEPROM Part-21
Security for iot and cloud aug 25b 2017
Raspberry Pi
UNIT 3.docx
System On Chip
Ad

Similar to Digital Security by Design: Physical Unclonable Functions - Gavin McWilliams, Queen's University Belfast (20)

PPT
Fuzzing 101 Webinar on Zero Day Management
PDF
Qualifying a high performance memory subsysten for Functional Safety
PDF
System-level Threats: Dangerous Assumptions in modern Product Security
PDF
Designing and implementing malicious processors
PDF
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
PDF
Unidirectional Network Architectures
PDF
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
PDF
Attacking SAP users with sapsploit
PPTX
[풀타임세미나 6주차] Half-Blind Attacks: Mask ROM Bootloaders are Dangerous
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PPTX
Core security utcpresentation962012
PPTX
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
PPTX
Sdl deployment in ics
PDF
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
PDF
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
PDF
Next Generation Security
PDF
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
PPTX
Fine line between performance and security
PDF
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
PDF
Advanced threat security - Cyber Security For The Real World
Fuzzing 101 Webinar on Zero Day Management
Qualifying a high performance memory subsysten for Functional Safety
System-level Threats: Dangerous Assumptions in modern Product Security
Designing and implementing malicious processors
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
Unidirectional Network Architectures
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
Attacking SAP users with sapsploit
[풀타임세미나 6주차] Half-Blind Attacks: Mask ROM Bootloaders are Dangerous
Sourcefire Webinar - NEW GENERATION IPS
Core security utcpresentation962012
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
Sdl deployment in ics
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
Next Generation Security
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
Fine line between performance and security
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Advanced threat security - Cyber Security For The Real World
Ad

More from KTN (20)

PDF
Competition Briefing - Open Digital Solutions for Net Zero Energy
 
PDF
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
 
PDF
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
 
PPTX
UK Catalysis: Innovation opportunities for an enabling technology
 
PPTX
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
 
PDF
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
PDF
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
PPTX
Smart Networks and Services Joint Undertaking (SNS JU) Call Topics
 
PDF
Building Talent for the Future 2 – Expression of Interest Briefing
 
PDF
Connected and Autonomous Vehicles Cohort Workshop
 
PDF
Biodiversity and Food Production: The Future of the British Landscape
 
PDF
Engage with...Performance Projects
 
PDF
How to Create a Good Horizon Europe Proposal Webinar
 
PDF
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
 
PDF
Engage with...Custom Interconnect
 
PDF
Engage with...ZF
 
PDF
Engage with...FluxSys
 
PDF
Made Smarter Innovation: Sustainable Smart Factory Competition Briefing
 
PDF
Driving the Electric Revolution – PEMD Skills Hub
 
PDF
Medicines Manufacturing Challenge EDI Survey Briefing Webinar
 
Competition Briefing - Open Digital Solutions for Net Zero Energy
 
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
 
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
 
UK Catalysis: Innovation opportunities for an enabling technology
 
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
Smart Networks and Services Joint Undertaking (SNS JU) Call Topics
 
Building Talent for the Future 2 – Expression of Interest Briefing
 
Connected and Autonomous Vehicles Cohort Workshop
 
Biodiversity and Food Production: The Future of the British Landscape
 
Engage with...Performance Projects
 
How to Create a Good Horizon Europe Proposal Webinar
 
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
 
Engage with...Custom Interconnect
 
Engage with...ZF
 
Engage with...FluxSys
 
Made Smarter Innovation: Sustainable Smart Factory Competition Briefing
 
Driving the Electric Revolution – PEMD Skills Hub
 
Medicines Manufacturing Challenge EDI Survey Briefing Webinar
 

Recently uploaded (20)

PPTX
Causes of Flooding by Slidesgo sdnl;asnjdl;asj.pptx
PDF
321 LIBRARY DESIGN.pdf43354445t6556t5656
PDF
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
PDF
2025_AIFG_Akane_Kikuchi_Empathy_Design.PDF
PPTX
2. Competency Based Interviewing - September'16.pptx
PPTX
VERNACULAR_DESIGN_PPT FINAL WITH PROPOSED PLAN.pptx
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
PPT
EthicsNotesSTUDENTCOPYfghhnmncssssx sjsjsj
PPTX
NEW EIA PART B - Group 5 (Section 50).pptx
PPT
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
PPTX
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
PPTX
Entrepreneur intro, origin, process, method
PDF
The Basics of Presentation Design eBook by VerdanaBold
PDF
Architecture Design Portfolio- VICTOR OKUTU
PPT
aksharma-dfs.pptgfgfgdfgdgdfgdfgdgdrgdgdgdgdgdgadgdgd
PPTX
timber basics in structure mechanics (dos)
PDF
GSH-Vicky1-Complete-Plans on Housing.pdf
PPTX
a group casestudy on architectural aesthetic and beauty
PDF
Chalkpiece Annual Report from 2019 To 2025
PPT
robotS AND ROBOTICSOF HUMANS AND MACHINES
Causes of Flooding by Slidesgo sdnl;asnjdl;asj.pptx
321 LIBRARY DESIGN.pdf43354445t6556t5656
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
2025_AIFG_Akane_Kikuchi_Empathy_Design.PDF
2. Competency Based Interviewing - September'16.pptx
VERNACULAR_DESIGN_PPT FINAL WITH PROPOSED PLAN.pptx
DOC-20250430-WA0014._20250714_235747_0000.pptx
EthicsNotesSTUDENTCOPYfghhnmncssssx sjsjsj
NEW EIA PART B - Group 5 (Section 50).pptx
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
Entrepreneur intro, origin, process, method
The Basics of Presentation Design eBook by VerdanaBold
Architecture Design Portfolio- VICTOR OKUTU
aksharma-dfs.pptgfgfgdfgdgdfgdfgdgdrgdgdgdgdgdgadgdgd
timber basics in structure mechanics (dos)
GSH-Vicky1-Complete-Plans on Housing.pdf
a group casestudy on architectural aesthetic and beauty
Chalkpiece Annual Report from 2019 To 2025
robotS AND ROBOTICSOF HUMANS AND MACHINES

Digital Security by Design: Physical Unclonable Functions - Gavin McWilliams, Queen's University Belfast

  • 1. DIGITAL SECURITY BY DESIGN WORKSHOP GAVIN MCWILLIAMS Director of Engineering 26 September 2019
  • 3. What is a PUF? PUF 000000000000 70db46a1208fe753 29d3a6720fc43805 39e01f6290ac89d0 A PUF (Physical Unclonable Function) is a digital circuit that uses manufacturing process variations to generate a unique digital fingerprint. No two chips should give the same response when supplied with the same challenge. Oxide Doping Feature size Process Variations
  • 4. PUF Classification: Weak Vs Strong Weak PUF • Typically have no (or one fixed) challenge - e.g. SRAM PUF, Butterfly PUF. • Assumed an attacker cannot access the responses of “Weak” PUFs as one or few CRPs could be used to build a model of the security system • Applications include: - Identity generation - RNG seed - Non volatile key storage - Hardware root of trust - Anti-Cloning
  • 5. PUF Classification: Weak Vs Strong Strong PUF • May have many possible challenge response pairs (CRPs), e.g. Arbiter PUF. • With access to the CRPs, it should be infeasible to model the system and determine the CRPs of a strong PUF • Applications include: - Challenge-response authentication - Anti-cloning
  • 6. FPGA Testbed: 240 Xilinx Zynq devices (ARM Cortex-A9 + Artix-7 FPGA) www.csit.qub.ac.uk 6
  • 7. Software PUF • SRAM PUF on ARM Cortex-M4 processors www.csit.qub.ac.uk 7 Uniqueness Source:https://www.arm.com/assets Source: drprem.com Ideal uniqueness = 0.5
  • 10. Secure Boot • Boot without trusting Xilinx • Bitstream encryption without blowing fuses • Or battery backed storage • Only helper data changes between devices, the key can be set the same