基于DSP IP核的双模态可配置软PUF

郑紫阳, 汪鹏君, 李刚, 陈博, 杨欣荣, 李翔宇

集成电路与嵌入式系统 ›› 2025, Vol. 25 ›› Issue (6) : 29-38.

PDF(7534 KB)
PDF(7534 KB)
集成电路与嵌入式系统 ›› 2025, Vol. 25 ›› Issue (6) : 29-38. DOI: 10.20193/j.ices2097-4191.2025.0018
FPGA前沿技术与应用研究专刊

基于DSP IP核的双模态可配置软PUF

作者信息 +

Dual-modal configurable software PUF based on DSP IP core

Author information +
文章历史 +

摘要

随着信息技术和人工智能的快速发展,物联网终端设备的功能愈加复杂,因其硬件资源受限,导致系统安全面临严重威胁。鉴于此,利用采样寄存器的时序违例行为特性,结合FPGA中DSP IP核内部组合逻辑延迟特征,提出一种基于DSP IP核的双模态可配置软PUF设计方案。首先,分析Xilinx Artix-7 FPGA中的DSP IP核内部结构,根据其组合逻辑延时信息和时序约束,确定正常传输数据的时钟周期范围。然后,根据激励位数需求配置两种不同运算模式,分别施加超频时钟,使采样寄存器在发生时序违例后产生异常运算结果。最后,通过哈希算法和奇偶校验将不同位数的异常数据压缩为1位PUF响应。该方案无需额外设计偏差提取电路,可在不改变硬件结构的条件下灵活配置两种不同激励位数的软PUF实现方式。测试结果表明,两种运算模式的可靠性均超过98%,具备良好的唯一性及抗机器学习攻击能力,验证了其在安全性与实用性方面的可行性与优势。

Abstract

With the rapid advancement of information technology and artificial intelligence, the increasingly complex functions of IoT terminal devices have resulted in significant security threats due to their limited hardware resources. To address this, this paper proposes a dual-mode configurable software PUF (Physical Unclonable Function) design based on the DSP IP core. This approach leverages the timing violation behavior characteristics of sampling registers and the combinational logic delay features within the DSP IP core of FPGA. First, the internal structure of DSP IP cores in Xilinx Artix-7 FPGA is analyzed, determining the clock cycle range for normal data transmission based on their combinational logic delay information and timing constraints. Next, two distinct operational modes are configured based on the required challenge bit length, with overclocked clocks applied to induce abnormal computational results through timing violation in the sampling registers. Finally, a hash algorithm and parity check are used to compress the abnormal data of varying bit lengths into a 1-bit PUF response. This design eliminates the need for additional bias extraction circuits and allows for flexible configuration of two different challenge bit lengths for the software PUF implementation without modifying the hardware structure. The experimental results demonstrate that both operational modes achieve a reliability of over 98%, with excellent uniqueness and resistance to machine learning attacks, thereby validating the proposed scheme's feasibility and advantages in terms of both security and practicality.

关键词

物理不可克隆函数 / 时序违例 / DSP IP核 / 硬件安全

Key words

physical unclonable function / timing violation / DSP IP core / hardware security

引用本文

导出引用
郑紫阳, 汪鹏君, 李刚, . 基于DSP IP核的双模态可配置软PUF[J]. 集成电路与嵌入式系统. 2025, 25(6): 29-38 https://doi.org/10.20193/j.ices2097-4191.2025.0018
ZHENG Ziyang, WANG Pengjun, LI Gang, et al. Dual-modal configurable software PUF based on DSP IP core[J]. Integrated Circuits and Embedded Systems. 2025, 25(6): 29-38 https://doi.org/10.20193/j.ices2097-4191.2025.0018
中图分类号: TN492 (专用集成电路)   

参考文献

[1]
GASSEND B, CLARKE D, DIJK M, et al. Silicon physical random functions[C]// Proceedings of the 9th ACM conference on computer and communications security,New York,USA, 2002:148-160.
[2]
NI L, WANG P, ZHANG Y, et al. PI PUF: A Processor-Intrinsic PUF for IoT[J]. Computers and Electrical Engineering, 2023,105.
[3]
ZHOU Z, WANG P, LI G. Bagua Protocol:A Whole-Process Configurable Protocol for IoT Sensing Devices Security Based on Strong PUF[J]. IEEE Internet of Things Journal, 2024, 11(1):805-819.
[4]
MAITI A, SCHAUMONT P. A novel microprocessor-intrinsic Physical Unclonable Function[C]// 22nd International Conference on Field Programmable Logic and Applications (FPL),Oslo,Norway, 2012:380-387.
[5]
KONG J, KOUSHANFAR F, PENDYALA P K, et al. PUFatt: Embedded platform attestation based on novel processor-based PUFs[C]// 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC),IEEE,San Francisco,CA,USA, 2014:1-6.
[6]
TSIOKANOS I, MISKELLY J, GU C. DTA-PUF: Dynamic Timing-aware Physical Unclonable Function for Resource-constrained Devices[J]. ACM Journal on Emerging Technologies in Computing Systems, 2021:1-24.
[7]
ZHAO X, CUI Y, GU C, et al. High Reliable Processor-Based PUF on Voltage Over-Scaling Technique[C]// 2024 Asian Hardware Oriented Security and Trust Symposium (Asian HOST),IEEE,Kobe,Japan, 2024:1-6.
[8]
CHEN J, WANG P, ZHANG Y, et al. SPUF design based on Camellia encryption algorithm[J]. Microelectronics Journal, 2021,112.
[9]
AMD. Artix 7 FPGAs Data Sheet: DC and AC Switching Characteristics, 2024.
[10]
汪鹏君, 方皓冉, 李刚. 基于混沌映射的抗机器学习攻击强物理不可克隆函数[J]. 电子与信息学报, 2024, 46(5):2281-2288.
WANG P, FANG H, LI G. Strong physical unclonable functions against machine learning attacks based on chaotic mapping[J]. Journal of Electronics & Information Technology, 2024, 46(5):2281-2288. (in Chinese)
[11]
XU C, ZHANG J, LAW M K, et al. Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With 200 Million Training CRPs[J]. IEEE Transactions on Information Forensics and Security, 2023, 18:2188-2203.
[12]
LIU K, CHEN X, PU H, et al. A 0.5-V Hybrid SRAM Physically Unclonable Function Using Hot Carrier Injection Burn-In for Stability Reinforcement[J]. IEEE Journal of Solid-State Circuits, 2021, 56(7):2193-2204.
[13]
WANG B, CUI Y, GU C, et al. Novel Intrinsic Physical Unclonable Function Design for Post-quantum Cryptography[C]// 2023 IEEE International Symposium on Circuits and Systems (ISCAS),IEEE,Monterey,CA,USA, 2023:1-5.
[14]
LI X, WANG P, LI G, et al. Design of Interface Circuits and Lightweight PUF for TMR Sensors[J]. IEEE Sensors Journal, 2023, 23(11):11754-11761.

基金

国家自然科学基金项目(62174121)
国家自然科学基金项目(62234008)

编辑: 薛士然
PDF(7534 KB)

Accesses

Citation

Detail

段落导航
相关文章

/