The University of Southampton
University of Southampton Institutional Repository

A PUF based on the non-linearity of memristors

A PUF based on the non-linearity of memristors
A PUF based on the non-linearity of memristors
As autonomous devices are increasingly used in security and safety-critical applications the security of the systems they comprise is of increasing concern. In such situations it is important that devices can be securely identified and trusted. When an IC or device is in the supply chain, or in the field, the lack of control over actors who can obtain physical access can compromise the trust and overall security of a system. Counterfeit chips may be incorporated into the device, compromising reliability or security. Additionally, for implemented devices, keys stored on-device may be copied by a bad actor. To help improve the security of such devices this paper proposes a new physical unclonable function (PUF) architecture, based on a TiOx memristor-based resistive memory (RRAM), that exploits the inherent analogue non-linearity in resistance of some memristor technologies. By directly exploiting non-linearity of memristor cells, rather than relying on the devices' absolute resistance at a single test voltage, a multi-bit-per-comparison PUF is created. As the architecture directly exploits cells' non-linearity, an additional source of hard-to-clone entropy is incorporated.
RRAM, hardware security, memristor, physical unclonable functions
558-563
IEEE
Aitchison, Callum
a3e31cb3-c35b-42b5-b0e7-8e8220680b97
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Serb, Alex
8895cd22-f076-4bbb-8f28-f4539242b947
Prodromakis, Themis
fc63125d-21a9-4b33-a148-512dd175736f
Aitchison, Callum
a3e31cb3-c35b-42b5-b0e7-8e8220680b97
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Serb, Alex
8895cd22-f076-4bbb-8f28-f4539242b947
Prodromakis, Themis
fc63125d-21a9-4b33-a148-512dd175736f

Aitchison, Callum, Halak, Basel, Serb, Alex and Prodromakis, Themis (2023) A PUF based on the non-linearity of memristors. In 2023 IEEE International Conference on Cyber Security and Resilience. IEEE. pp. 558-563 . (doi:10.1109/CSR57506.2023.10224980).

Record type: Conference or Workshop Item (Paper)

Abstract

As autonomous devices are increasingly used in security and safety-critical applications the security of the systems they comprise is of increasing concern. In such situations it is important that devices can be securely identified and trusted. When an IC or device is in the supply chain, or in the field, the lack of control over actors who can obtain physical access can compromise the trust and overall security of a system. Counterfeit chips may be incorporated into the device, compromising reliability or security. Additionally, for implemented devices, keys stored on-device may be copied by a bad actor. To help improve the security of such devices this paper proposes a new physical unclonable function (PUF) architecture, based on a TiOx memristor-based resistive memory (RRAM), that exploits the inherent analogue non-linearity in resistance of some memristor technologies. By directly exploiting non-linearity of memristor cells, rather than relying on the devices' absolute resistance at a single test voltage, a multi-bit-per-comparison PUF is created. As the architecture directly exploits cells' non-linearity, an additional source of hard-to-clone entropy is incorporated.

Text
A PUF Based on the Non-Linearity of Memristors - Accepted Manuscript
Download (500kB)

More information

Accepted/In Press date: 6 May 2023
Published date: 28 August 2023
Additional Information: Funding Information: This work was supported by the UK Research and Innovation Centre for Doctoral Training in Machine Intelligence for Nano-electronic Devices and Systems [EP/S024298/1]. The authors would like to acknowledge the support of the EPSRC FORTE Programme Grant [EP/R024642/1] and the RAEng Chair in Emerging Technologies [CiET1819/2/93]. Publisher Copyright: © 2023 IEEE.
Venue - Dates: 2023 IEEE International Conference on Cyber Security and Resilience, , Venice, Italy, 2023-07-31 - 2023-08-02
Keywords: RRAM, hardware security, memristor, physical unclonable functions

Identifiers

Local EPrints ID: 477889
URI: http://eprints.soton.ac.uk/id/eprint/477889
PURE UUID: 5a65fc51-603c-4ffc-974a-dabe1c67f4b2
ORCID for Basel Halak: ORCID iD orcid.org/0000-0003-3470-7226

Catalogue record

Date deposited: 15 Jun 2023 17:04
Last modified: 17 Mar 2024 03:25

Export record

Altmetrics

Contributors

Author: Callum Aitchison
Author: Basel Halak ORCID iD
Author: Alex Serb
Author: Themis Prodromakis

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×