Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2459976.2459978acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Resilient device authentication system (RDAS) through SIOMETRICS

Published:08 January 2013Publication History

ABSTRACT

In recent decades, human biometrics have been used authenticate the identity of human beings and provide access control. In this paper, we describe the use of Silicon-based "Biometrics" (SIOMETRICS) as the root of trust for Identity Management. This disruptive technological approach is a result of a combination of recent advances in Physical Unclonable Function (PUF) technology, which uses the inherent minute manufacturing variations in semiconductor devices as a silicon "fingerprint," and advanced identity management techniques. Collaboration between academia, leading industry innovators, and a high assurance security DoD provider has resulted in an architectural approach to change the paradigm in cyber security by reducing the attack surface and total cost of security. This approach is applicable to addressing the supply chain risk management problem by providing a lifecycle chain of custody/trust and securing: content/services ("the Cloud"), Mobile Device Integrity (MDI), Bring Your Own Device (BYOD), weapon systems, critical infrastructure protection, and other use cases.

References

  1. Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., and Khandelwal, V. 2008. Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. IEEE International Conference on RFID, 2008, pp. 58--64.Google ScholarGoogle Scholar
  2. Gassend, B., Clarke, D., Dijk, M.-V., and Devadas, S. 2002. Silicon physical random functions. ACM Computer and Communication Security (CCS) Conference, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Holcomb, D., Burleson, W., and Fu, K. 2007. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. IEEE International Conference on RFID, 2007.Google ScholarGoogle Scholar
  4. Lim, D. 2004. Extracting secret keys from integrated circuits. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT), 2004.Google ScholarGoogle Scholar
  5. Paral, Z., and Devadas, S. 2011. Reliable and efficient PUF-based key generation using pattern matching, IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2011.Google ScholarGoogle Scholar
  6. Ruhrmair, U., Sehnke, F., Sorter, J., Dror, G., Devadas S., and Schmidhuber, J. 2010. Modeling attacks on Physical Unclonable Functions. ACM Computer and Communication Security (CCS) Conference, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Su, Y., Holleman, J., and Otis, B. 2007. A 1.6pJ/bit 96 (percent) stable chip ID generating circuit using process variations. IEEE International Solid-State Circuits Conference (ISSCC), 2007, pp. 200--201.Google ScholarGoogle Scholar
  8. Suh, G. 2005. AEGIS: a single-chip secure processor. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Suh, G. and Devadas, S., 2007. Physical Unclonable Functions for device authentication and secret key generation. Design Automation Conference (DAC), 2007, pp. 9--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Yu, M., and Devadas, S. 2010. Recombination of Physical Unclonable Functions. Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2010.Google ScholarGoogle Scholar
  11. Yu, M., Sowell, R., Singh, A., M'Raïhi, D., and Devadas, S. 2012. Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC. IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2012Google ScholarGoogle Scholar

Index Terms

  1. Resilient device authentication system (RDAS) through SIOMETRICS

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader