SlideShare a Scribd company logo
8 July 2017
1
A PUF-FSM Binding Scheme for FPGA IP
Protection and Pay-Per Device licensing
Submitted by;
ELIZABETH MATHEW
S1 M.Tech EC
Guide:
Er. NIA ACHU ISSAC
Assistant professor
ECE Department
CKC Manoor
CKC MANOOR MTECH EC
CONTENTS
 Introduction
 Existing Scheme.
 Limitations of existing scheme.
 Technologies used.
 Working.
 Advantages.
 Disadvantages.
 Future scope.
 Conclusion.
2
CKC MANOOR MTECH EC
8 July 2017
INTRODUCTION
 Novel IP protection
 Restrict IP’S execution only on Specific FPGA devices.
 Protect IP’S from cloning/copying.
 Counterfeits avoided.
 First non encryption based HWIP binding
method
3CKC MANOOR MTECH EC
8 July 2017
TRADITIONAL BINDING SCHEME
 Secret key in on-chip memory.
 Cryptography used to authenticate an IC.
4
IC with
a secret key
Sends a random number
Sign the number with a secret key
Only the IC’s key can generate
a valid signature
CKC MANOOR MTECH EC
8 July 2017
EXISTING METHODS
 Bit-stream encryption.
 Advanced encryption standard (AES) core.
 Keyed-hash message authentication code (HMAC) core.
 Triple data encryption standard (3DES).
5
CKC MANOOR MTECH EC
8 July 2017
LIMITATIONS OF EXISTING METHODS
 No solution-: pay-per-device licensing requirement.
 Security vulnerabilities.
 On-chip modules needed.
 Not appropriate for resource-limited environments
 Allows attackers to attack at any time.
 Expensive and insecure.
 Damage brand reputation.
6
CKC MANOOR MTECH EC
8 July 2017
PROPOSED SYSTEM
 Binds FSM with PUF.
 Unique ID for each device.
 Secure.
 No secret key storage.
7CKC MANOOR MTECH EC
8 July 2017
8 July 2017
8
TECHNOLOGIES USED
PUF?
FSM?
FPGA?
IP?
9
8 July 2017
FIELD PROGRAMMABLE GATE
ARRAY
 Popular design platform
 Low NRE cost
 Shorter time to market
 Reprogrammable
 High flexibility
 Can implement any digital system
 Faster and cheaper design.
10
CKC MANOOR MTECH EC
8 July 2017
INTELLECTUAL PROPERTY(IP)
 Creations of the intellect.
 Monopoly is assigned to designated
owners by law.
 Law includes copyright, patent.
 Layout design, trade secrets.
11
CKC MANOOR MTECH EC
8 July 2017
FINITE STATE MACHINE (FSM)
 Popular model.
 Bind HWIPs to the FPGAs with PUFs
 Outputs depend on present input & history of the input.
 Finite number of states.
12
CKC MANOOR MTECH EC
8 July 2017
THE BINDING FSM STRUCTURE
13
CKC MANOOR MTECH EC
8 July 2017
PUF-PHYSICAL UNCLONABLE
FUNCTION
 Digital fingerprint.
 Persistent.
 Unpredictable.
 Unclonable.
 Tamper evident.
 Low cost.
14
CKC MANOOR MTECH EC
8 July 2017
PARTIES INVOLVED IN HWIP BINDING
 FPGA Vendor (FV)
 System Developer (SD)
 IP Core Vendor (CV)
 End User (EU)
15
CKC MANOOR MTECH EC
8 July 2017
WORKING
 FPGA Device Enrollment.
 Hardware IP Core Enrollment and Distribution
 Hardware IP Core Licensing.
 Product Licensing.
16
CKC MANOOR MTECH EC
8 July 2017
FPGA DEVICE ENROLLMENT
17
CKC MANOOR MTECH EC
8 July 2017
HARDWARE IP CORE ENROLLMENT AND
DISTRIBUTION
18
CKC MANOOR MTECH EC
8 July 2017
HARDWARE IP CORE LICENSING:
19
CKC MANOOR MTECH EC
8 July 2017
PRODUCT LICENSING
20
CKC MANOOR MTECH EC
8 July 2017
ADVANTAGES
 Protect both single FPGA configurations and third-party
FPGA IP cores.
 Supports the pay-per-device licensing mechanism.
 No permanent storage for secret keys in the FPGA.
21
CKC MANOOR MTECH EC
8 July 2017
DISADVANTAGES
 Design components without bound FSMs will
still be vulnerable to tamping attacks.
 Vulnerable to side channel attacks
22
CKC MANOOR MTECH EC
8 July 2017
FUTURE SCOPE
 Can introduce more secure protection mechanism
 Combined with anti-tamper methods.
 Appropriate countermeasures for side channel effects.
 Make applicable to high-speed designs that do not have
FSMs
23
CKC MANOOR MTECH EC
8 July 2017
CONCLUSION
 Enables binding hardware IPs to specific FPGAs utilizing the
PUF and the FSM.
 Protect the third-party FPGA IP cores
 Supports the pay-per-device licensing mechanism.
 Low hardware cost.
24
CKC MANOOR MTECH EC
8 July 2017
REFERENCE
 Jiliang zhang, Yaping Lin ”A PUF-FSM binding scheme for FPGA IP
Protection and pay-per-device licensing”IEEE Transactions on information
forensics and security, vol. 10, no. 6, june 2015 1137
 J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Physical
unclonable functions and public-key crypto for FPGA IP protection,”in
Proc. Int. Conf. Field Program. Logic Appl. (FPL), Aug. 2007,pp. 189–
195.
 Z. Paral and S. Devadas, “Reliable and efficient PUF-based key
generationusing pattern matching,” in Proc. IEEE Int. Symp. Hardw.-
Oriented Secur. Trust (HOST), Jun. 2011, pp. 128–133.
25
CKC MANOOR MTECH EC
8 July 2017
THANK YOU
26
CKC MANOOR MTECH EC
8 July 2017

More Related Content

PPTX
Internet of Things: Programming on the edge
PDF
BGP security at internet exchanges
PPTX
Advancing IoT Communication Security with TLS and DTLS v1.3
PPTX
Sundance VCS-1 for Precision Robotics
PDF
Efficient software development with heterogeneous devices
 
PDF
2014 Hardware Based IEEE Projects in VLSI
DOCX
home security System
Internet of Things: Programming on the edge
BGP security at internet exchanges
Advancing IoT Communication Security with TLS and DTLS v1.3
Sundance VCS-1 for Precision Robotics
Efficient software development with heterogeneous devices
 
2014 Hardware Based IEEE Projects in VLSI
home security System

What's hot (13)

DOCX
Different df fs in vhdl
PPTX
SDN-architecture
PPTX
Porting tock to open titan
PDF
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
PDF
HiPEAC 2019 Workshop - Hardware Starter Kit Agri
PDF
RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...
PPTX
TULIPP Starter Kit – AGRI
PPTX
RISC-V 30906 hex five multi_zone iot firmware
PPTX
智慧城市通用交通資訊端點系統
PDF
side-channel-kevin2600
PPTX
VF360 OpenVPX Board w. Altera Stratix and TI KeyStone DSP
PDF
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
PDF
Bosch Connected Experience - Sigfox Presentation
Different df fs in vhdl
SDN-architecture
Porting tock to open titan
Peripheral Programming using Arduino and Python on MediaTek LinkIt Smart 7688...
HiPEAC 2019 Workshop - Hardware Starter Kit Agri
RISC-V Verification Panel - is RISC-V Verification Ecosystem Ready for the Co...
TULIPP Starter Kit – AGRI
RISC-V 30906 hex five multi_zone iot firmware
智慧城市通用交通資訊端點系統
side-channel-kevin2600
VF360 OpenVPX Board w. Altera Stratix and TI KeyStone DSP
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
Bosch Connected Experience - Sigfox Presentation
Ad

Similar to A PUF-FSM Binding Scheme for FPGA IP PROTECTION (20)

PDF
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
PDF
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
PDF
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
PDF
“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...
PDF
Wrapped rsa cryptography check on window
PDF
How PUF Technology is Securing Io
PPTX
NGIoT standardisation workshops_Jens Hagemeyer presentation
PDF
Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...
 
PPT
FPGA_prototyping proccesing with conclusion
PDF
Brochure (2016-01-30)
PDF
⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA
PDF
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
PDF
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
PDF
Versal Premium ACAP for Network and Cloud Acceleration
PDF
Iaetsd near field
PDF
MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...
PDF
DPDK: Multi Architecture High Performance Packet Processing
PPT
Synopsys User Group Presentation
DOC
DOCX
Research Paper
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATION
“Accelerate Tomorrow’s Models with Lattice FPGAs,” a Presentation from Lattic...
Wrapped rsa cryptography check on window
How PUF Technology is Securing Io
NGIoT standardisation workshops_Jens Hagemeyer presentation
Implementing AI: Hardware Challenges: Ultra-Low Power AI at the Edge with Lat...
 
FPGA_prototyping proccesing with conclusion
Brochure (2016-01-30)
⭐⭐⭐⭐⭐ CHARLA FIEC: Monitoring of system memory usage embedded in #FPGA
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Versal Premium ACAP for Network and Cloud Acceleration
Iaetsd near field
MIPI DevCon 2020 | MIPI to Bluetooth LE: Leveraging Mobile Technology for Wir...
DPDK: Multi Architecture High Performance Packet Processing
Synopsys User Group Presentation
Research Paper
Ad

Recently uploaded (20)

PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Welding lecture in detail for understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Well-logging-methods_new................
DOCX
573137875-Attendance-Management-System-original
PDF
Digital Logic Computer Design lecture notes
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Welding lecture in detail for understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Well-logging-methods_new................
573137875-Attendance-Management-System-original
Digital Logic Computer Design lecture notes
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
additive manufacturing of ss316l using mig welding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Foundation to blockchain - A guide to Blockchain Tech

A PUF-FSM Binding Scheme for FPGA IP PROTECTION

  • 1. 8 July 2017 1 A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per Device licensing Submitted by; ELIZABETH MATHEW S1 M.Tech EC Guide: Er. NIA ACHU ISSAC Assistant professor ECE Department CKC Manoor CKC MANOOR MTECH EC
  • 2. CONTENTS  Introduction  Existing Scheme.  Limitations of existing scheme.  Technologies used.  Working.  Advantages.  Disadvantages.  Future scope.  Conclusion. 2 CKC MANOOR MTECH EC 8 July 2017
  • 3. INTRODUCTION  Novel IP protection  Restrict IP’S execution only on Specific FPGA devices.  Protect IP’S from cloning/copying.  Counterfeits avoided.  First non encryption based HWIP binding method 3CKC MANOOR MTECH EC 8 July 2017
  • 4. TRADITIONAL BINDING SCHEME  Secret key in on-chip memory.  Cryptography used to authenticate an IC. 4 IC with a secret key Sends a random number Sign the number with a secret key Only the IC’s key can generate a valid signature CKC MANOOR MTECH EC 8 July 2017
  • 5. EXISTING METHODS  Bit-stream encryption.  Advanced encryption standard (AES) core.  Keyed-hash message authentication code (HMAC) core.  Triple data encryption standard (3DES). 5 CKC MANOOR MTECH EC 8 July 2017
  • 6. LIMITATIONS OF EXISTING METHODS  No solution-: pay-per-device licensing requirement.  Security vulnerabilities.  On-chip modules needed.  Not appropriate for resource-limited environments  Allows attackers to attack at any time.  Expensive and insecure.  Damage brand reputation. 6 CKC MANOOR MTECH EC 8 July 2017
  • 7. PROPOSED SYSTEM  Binds FSM with PUF.  Unique ID for each device.  Secure.  No secret key storage. 7CKC MANOOR MTECH EC 8 July 2017
  • 10. FIELD PROGRAMMABLE GATE ARRAY  Popular design platform  Low NRE cost  Shorter time to market  Reprogrammable  High flexibility  Can implement any digital system  Faster and cheaper design. 10 CKC MANOOR MTECH EC 8 July 2017
  • 11. INTELLECTUAL PROPERTY(IP)  Creations of the intellect.  Monopoly is assigned to designated owners by law.  Law includes copyright, patent.  Layout design, trade secrets. 11 CKC MANOOR MTECH EC 8 July 2017
  • 12. FINITE STATE MACHINE (FSM)  Popular model.  Bind HWIPs to the FPGAs with PUFs  Outputs depend on present input & history of the input.  Finite number of states. 12 CKC MANOOR MTECH EC 8 July 2017
  • 13. THE BINDING FSM STRUCTURE 13 CKC MANOOR MTECH EC 8 July 2017
  • 14. PUF-PHYSICAL UNCLONABLE FUNCTION  Digital fingerprint.  Persistent.  Unpredictable.  Unclonable.  Tamper evident.  Low cost. 14 CKC MANOOR MTECH EC 8 July 2017
  • 15. PARTIES INVOLVED IN HWIP BINDING  FPGA Vendor (FV)  System Developer (SD)  IP Core Vendor (CV)  End User (EU) 15 CKC MANOOR MTECH EC 8 July 2017
  • 16. WORKING  FPGA Device Enrollment.  Hardware IP Core Enrollment and Distribution  Hardware IP Core Licensing.  Product Licensing. 16 CKC MANOOR MTECH EC 8 July 2017
  • 17. FPGA DEVICE ENROLLMENT 17 CKC MANOOR MTECH EC 8 July 2017
  • 18. HARDWARE IP CORE ENROLLMENT AND DISTRIBUTION 18 CKC MANOOR MTECH EC 8 July 2017
  • 19. HARDWARE IP CORE LICENSING: 19 CKC MANOOR MTECH EC 8 July 2017
  • 20. PRODUCT LICENSING 20 CKC MANOOR MTECH EC 8 July 2017
  • 21. ADVANTAGES  Protect both single FPGA configurations and third-party FPGA IP cores.  Supports the pay-per-device licensing mechanism.  No permanent storage for secret keys in the FPGA. 21 CKC MANOOR MTECH EC 8 July 2017
  • 22. DISADVANTAGES  Design components without bound FSMs will still be vulnerable to tamping attacks.  Vulnerable to side channel attacks 22 CKC MANOOR MTECH EC 8 July 2017
  • 23. FUTURE SCOPE  Can introduce more secure protection mechanism  Combined with anti-tamper methods.  Appropriate countermeasures for side channel effects.  Make applicable to high-speed designs that do not have FSMs 23 CKC MANOOR MTECH EC 8 July 2017
  • 24. CONCLUSION  Enables binding hardware IPs to specific FPGAs utilizing the PUF and the FSM.  Protect the third-party FPGA IP cores  Supports the pay-per-device licensing mechanism.  Low hardware cost. 24 CKC MANOOR MTECH EC 8 July 2017
  • 25. REFERENCE  Jiliang zhang, Yaping Lin ”A PUF-FSM binding scheme for FPGA IP Protection and pay-per-device licensing”IEEE Transactions on information forensics and security, vol. 10, no. 6, june 2015 1137  J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Physical unclonable functions and public-key crypto for FPGA IP protection,”in Proc. Int. Conf. Field Program. Logic Appl. (FPL), Aug. 2007,pp. 189– 195.  Z. Paral and S. Devadas, “Reliable and efficient PUF-based key generationusing pattern matching,” in Proc. IEEE Int. Symp. Hardw.- Oriented Secur. Trust (HOST), Jun. 2011, pp. 128–133. 25 CKC MANOOR MTECH EC 8 July 2017
  • 26. THANK YOU 26 CKC MANOOR MTECH EC 8 July 2017