Cargando…
A memristor fingerprinting and characterisation methodology for hardware security
The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify s...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10256690/ https://www.ncbi.nlm.nih.gov/pubmed/37296171 http://dx.doi.org/10.1038/s41598-023-33051-z |
_version_ | 1785057159889813504 |
---|---|
author | Aitchison, Callum Halak, Basel Serb, Alex Prodromakis, Themis |
author_facet | Aitchison, Callum Halak, Basel Serb, Alex Prodromakis, Themis |
author_sort | Aitchison, Callum |
collection | PubMed |
description | The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a [Formula: see text] memristor technology, and shown to be able to identify cells in a set. |
format | Online Article Text |
id | pubmed-10256690 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-102566902023-06-11 A memristor fingerprinting and characterisation methodology for hardware security Aitchison, Callum Halak, Basel Serb, Alex Prodromakis, Themis Sci Rep Article The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a [Formula: see text] memristor technology, and shown to be able to identify cells in a set. Nature Publishing Group UK 2023-06-09 /pmc/articles/PMC10256690/ /pubmed/37296171 http://dx.doi.org/10.1038/s41598-023-33051-z Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Aitchison, Callum Halak, Basel Serb, Alex Prodromakis, Themis A memristor fingerprinting and characterisation methodology for hardware security |
title | A memristor fingerprinting and characterisation methodology for hardware security |
title_full | A memristor fingerprinting and characterisation methodology for hardware security |
title_fullStr | A memristor fingerprinting and characterisation methodology for hardware security |
title_full_unstemmed | A memristor fingerprinting and characterisation methodology for hardware security |
title_short | A memristor fingerprinting and characterisation methodology for hardware security |
title_sort | memristor fingerprinting and characterisation methodology for hardware security |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10256690/ https://www.ncbi.nlm.nih.gov/pubmed/37296171 http://dx.doi.org/10.1038/s41598-023-33051-z |
work_keys_str_mv | AT aitchisoncallum amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT halakbasel amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT serbalex amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT prodromakisthemis amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT aitchisoncallum memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT halakbasel memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT serbalex memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT prodromakisthemis memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity |