Cargando…

A memristor fingerprinting and characterisation methodology for hardware security

The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify s...

Descripción completa

Detalles Bibliográficos
Autores principales: Aitchison, Callum, Halak, Basel, Serb, Alex, Prodromakis, Themis
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10256690/
https://www.ncbi.nlm.nih.gov/pubmed/37296171
http://dx.doi.org/10.1038/s41598-023-33051-z
_version_ 1785057159889813504
author Aitchison, Callum
Halak, Basel
Serb, Alex
Prodromakis, Themis
author_facet Aitchison, Callum
Halak, Basel
Serb, Alex
Prodromakis, Themis
author_sort Aitchison, Callum
collection PubMed
description The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a [Formula: see text] memristor technology, and shown to be able to identify cells in a set.
format Online
Article
Text
id pubmed-10256690
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-102566902023-06-11 A memristor fingerprinting and characterisation methodology for hardware security Aitchison, Callum Halak, Basel Serb, Alex Prodromakis, Themis Sci Rep Article The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a [Formula: see text] memristor technology, and shown to be able to identify cells in a set. Nature Publishing Group UK 2023-06-09 /pmc/articles/PMC10256690/ /pubmed/37296171 http://dx.doi.org/10.1038/s41598-023-33051-z Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Aitchison, Callum
Halak, Basel
Serb, Alex
Prodromakis, Themis
A memristor fingerprinting and characterisation methodology for hardware security
title A memristor fingerprinting and characterisation methodology for hardware security
title_full A memristor fingerprinting and characterisation methodology for hardware security
title_fullStr A memristor fingerprinting and characterisation methodology for hardware security
title_full_unstemmed A memristor fingerprinting and characterisation methodology for hardware security
title_short A memristor fingerprinting and characterisation methodology for hardware security
title_sort memristor fingerprinting and characterisation methodology for hardware security
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10256690/
https://www.ncbi.nlm.nih.gov/pubmed/37296171
http://dx.doi.org/10.1038/s41598-023-33051-z
work_keys_str_mv AT aitchisoncallum amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT halakbasel amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT serbalex amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT prodromakisthemis amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT aitchisoncallum memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT halakbasel memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT serbalex memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT prodromakisthemis memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity