Title: Hardware security threats and countermeasures: a study of obfuscation, camouflaging and PUFs

Authors: Hamza Al Maharmeh; Mohammad Alhawari; Chung-Chih Hung; Mohammed Ismail

Addresses: Department of Electrical and Computer Engineering, Wayne State University, Detroit, USA ' Department of Electrical and Computer Engineering, Wayne State University, Detroit, USA ' Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu, Taiwan ' Department of Electrical and Computer Engineering, Wayne State University, Detroit, USA

Abstract: Hardware security threats have gained a tremendous attention where extensive research efforts have been expended toward developing effective countermeasures. These threats can be categorised into five main attacks which are: reverse engineering, side-channel analysis, intellectual property (IP) cores piracy/IC overbuilding, counterfeiting, and hardware Trojans. This paper investigates the most efficient state-of-the-art techniques that are used to thwart main hardware attacks. Reported work in the literature proposed various countermeasures, where obfuscation, camouflaging, and physically unclonable functions (PUFs) are considered the most powerful and effective methods. In obfuscation technique, the chip will be locked and it will not function properly unless the correct secret key is supplied. This paper addresses also camouflaging countermeasure which is a layout-based technique that is used to protect IP cores. Additionally, this paper provides a detailed study on silicon PUFs, where they can be classified into weak and strong PUFs. In this paper, various PUF architectures will be discussed along with the design constraints.

Keywords: hardware security; physical unclonable functions; PUFs; weak PUFs; strong PUFs; silicon PUFs; obfuscation; camouflaging; logic locking.

DOI: 10.1504/IJMIS.2019.104796

International Journal of Multimedia Intelligence and Security, 2019 Vol.3 No.3, pp.271 - 292

Received: 27 Jan 2019
Accepted: 12 Aug 2019

Published online: 29 Jan 2020 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article