Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • Review Article
  • Published:

Physical unclonable functions

Abstract

A physical unclonable function (PUF) is a device that exploits inherent randomness introduced during manufacturing to give a physical entity a unique ‘fingerprint’ or trust anchor. These devices are of potential use in a variety of applications from anti-counterfeiting, identification, authentication and key generation to advanced protocols such as oblivious transfer, key exchange, key renovation and virtual proof of reality. Here we review the development of PUFs, including those that exploit optical, circuit time-delay and volatile/non-volatile memory characteristics. We examine the various applications of PUFs, and consider the security issues that they must confront, highlighting known attacks to date and potential countermeasures. We also consider the key areas for future development such as bit-specific reliability, reconfigurability and public key infrastructure.

This is a preview of subscription content, access via your institution

Access options

Buy this article

Prices may be subject to local taxes which are calculated during checkout

Fig. 1: PUF basics.

Fingerprint image in a, Andrey Kuzmin / Alamy Stock Vector

Fig. 2: A fuzzy extractor and its two dominant constructions.
Fig. 3: Employing a PUF within the public key infrastructure.

Similar content being viewed by others

References

  1. Bonomi, J. Nineveh and its Palaces (Bradbury & Evans, 1852).

  2. Rührmair, U., Devadas, S. & Koushanfar, F. in Introduction to Hardware Security and Trust (eds. Tehranipoor, M. & Wang, C.) Ch. 4 (Springer, 2012).

  3. Maiti, A., Casarona, J., McHale, L. and Schaumont, P. A large scale characterization of RO-PUF. In Int. Symp. Hardware-Oriented Security and Trust (HOST) 94–99 (IEEE, 2010).

  4. PUF Datasets (Trust Hub, accessed 7 January 2020); https://www.trust-hub.org/data

  5. Hesselbarth, R., Wilde, F., Gu, C. & Hanley, N. Large Scale RO PUF Analysis over Slice Type, Evaluation Time and Temperature on 28nm Xilinx FPGAs. (Fraunhofer AISEC, accessed 7 January 2020); https://s3.eu-central-1.amazonaws.com/aisecresearchdata/2018fpga-ro-data/index.html

  6. Hussain, S. U. ArbiterPUF FPGA Programmable Delay Lines (accessed 7 January 2020); https://doi.org/10.6084/m9.figshare.3188731.v2

  7. Su, Y. et al. Secucode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices (IEEE, accessed 7 January 2020); https://doi.org/10.21227/H27T0S

  8. Graybeal, S. N. & McFate, P. B. Getting out of the STARTing block. Sci. Am. 261, 61–67 (1989).

    Article  Google Scholar 

  9. Pappu, R., Recht, B., Taylor, J. & Gershenfeld, N. Physical one-way functions. Science 297, 2026–2030 (2002).

    Article  Google Scholar 

  10. Suh, G. E. & Devadas, S. Physical unclonable functions for device authentication and secret key generation. In Proc. 44th ACM Annual Design Automation Conference 9–14 (ACM, 2007).

  11. Herder, C., Yu, M.-D., Koushanfar, F. & Devadas, S. Physical unclonable functions and applications: a tutorial. Proc. IEEE 102, 1126–1141 (2014).

  12. Gassend, B., Clarke, D., Van Dijk, M. & Devadas, S. Silicon physical random functions. In Proc. ACM Conf. Computer and Communications Security 148–160 (ACM, 2002).

  13. Rührmair, U. et al. Modeling attacks on physical unclonable functions. In Proc. ACM Conf. Computer and Communications Security 237–249 (ACM, 2010). The most efficient modelling attacks on PUFs by only using challenge–response pairs.

  14. Rührmair, U. et al. PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Security 8, 1876–1891 (2013).

    Article  Google Scholar 

  15. Becker, G. T. The gap between promise and reality: on the insecurity of XOR Arbiter PUFs. In Proc. Cryptographic Hardware and Embedded Systems 535–555 (Springer, 2015). Efficient modelling attacks on PUFs with assistance of response unreliability as side-channel information.

  16. Becker, G. T. On the pitfalls of using arbiter-PUFs as building blocks. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 34, 1295–1307 (2015).

  17. Nguyen, P. H. et al. The interpose PUF: secure PUF design against state-of-the-art machine learning attacks. IACR Trans. Crypt. Hardw. Embed. Syst. 2019, 243–290 (2019).

  18. Sahoo, D. P., Mukhopadhyay, D., Chakraborty, R. S. & Nguyen, P. H. A multiplexer-based arbiter PUF composition with enhanced reliability and security. IEEE Trans. Comput. 67, 403–417 (2018).

    Article  MathSciNet  Google Scholar 

  19. Yu, M.-D. et al. A lockdown technique to prevent machine learning on PUFs for lightweight authentication. IEEE Trans. Multi-Scale Comput. Syst. 2, 146–159 (2016).

    Article  Google Scholar 

  20. Guajardo, J., Kumar, S. S., Schrijen, G. J. & Tuyls, P. FPGA intrinsic PUFs and their use for IP protection. In Proc. Cryptographic Hardware and Embedded Systems 63–80 (Springer, 2007).

  21. Holcomb, D. E., Burleson, W. P. & Fu, K. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In Proc. Conf. RFID Security 2 (2007).

  22. Kim, Y. & Lee, Y. Cam PUF: physically unclonable function based on CMOS image sensor fixed pattern noise. In Proc. 55th Annual Design Automation Conference. 66 (ACM, 2018).

  23. Willers, O., Huth, C., Guajardo, J., Seidel, H. & Deutsch, P. On the feasibility of deriving cryptographic keys from MEMS sensors. J. Crypt. Eng. https://doi.org/10.1007/s13389-019-00208-4 (2019).

  24. Wang, Y. et al. Flash memory for ubiquitous hardware security functions: true random number generation and device fingerprints. In Proc. IEEE Symp. Security and Privacy 33–47 (IEEE, 2012).

  25. Tehranipoor, F., Karimian, N., Xiao, K. & Chandy, J. DRAM based intrinsic physical unclonable functions for system level security. In Proc. Great Lakes Symp. VLSI. 15–20 (ACM, 2015).

  26. Orosa, L. et al. Dataplant: enhancing system security with low-cost in-DRAM value generation primitives. Preprint at https://arxiv.org/abs/1902.07344v2 (2019).

  27. Maes, R., Van Herrewege, A. & Verbauwhede, I. PUFKY: a fully functional PUF-based cryptographic key generator. In Proc. Cryptographic Hardware and Embedded Systems 302–319 (Springer, 2012).

  28. Delvaux, J., Gu, D., Schellekens, D. & Verbauwhede, I. Helper data algorithms for PUF-based key generation: overview and analysis. IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 34, 889–902 (2015).

    Article  Google Scholar 

  29. Bösch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J. & Tuyls, P. Efficient helper data key extractor on FPGAs. In Proc. Cryptographic Hardware and Embedded Systems. 181–197 (Springer, 2008). Early efficient implementations of fuzzy extractors on FPGA for PUF key generation.

  30. Maes, R., Tuyls, P. & Verbauwhede, I. A soft decision helper data algorithm for SRAM PUFs. In Proc. IEEE Int. Symp. Information Theory 2101–2105 (IEEE, 2009). A study of response bit-specific reliability.

  31. Maes, R. An accurate probabilistic reliability model for silicon PUFs. In Proc. Cryptographic Hardware and Embedded Systems 73–89 (IACR, 2013).

  32. Yu, M.-D. & Devadas, S. Secure and robust error correction for physical unclonable functions. IEEE Des. Test. Comput. 27, 48–65 (IEEE, 2010).

  33. Hiller, M., Merli, D., Stumpf, F. & Sigl, G. Complementary IBS: application specific error correction for PUFs. In Proc. IEEE Int. Symp. Hardware-Oriented Security and Trust (HOST) https://doi.org/10.1109/HST.2012.6224310 (IEEE, 2012).

  34. Delvaux, J., Gu, D., Verbauwhede, I., Hiller, M. & Yu, M.-D. Efficient fuzzy extraction of PUF-induced secrets: theory and applications. In Proc. Cryptographic Hardware and Embedded Systems 412–431 (Springer, 2016).

  35. Maes, R., van der Leest, V., van der Sluis, E. & Willems, F. Secure key generation from biased PUFs: extended version. J. Crypt. Eng. 6, 121–137 (2016).

    Article  Google Scholar 

  36. Koeberl, P. et al. Evaluation of a PUF device authentication scheme on a discrete 0.13 μm SRAM. In Proc. Int. Conf. Trusted Systems 271–288 (Springer, 2011).

  37. Gunn, L. J., Allison, A. & Abbott, D. Allison mixtures: where random digits obey thermodynamic principles. In Int. J. Mod. Phys. 33, 1460360 (2014).

  38. Aysu, A., Wang, Y., Schaumont, P. & Orshansky, M. A new maskless debiasing method for lightweight physical unclonable functions. In Proc. IEEE Int. Symp. Hardware Oriented Security and Trust 134–139 (IEEE, 2017).

  39. Hiller, M. & Önalan, A. G. Hiding secrecy leakage in leaky helper data. In Proc. Cryptographic Hardware and Embedded Systems 601–619 (Springer, 2017).

  40. Delvaux, J. & Verbauwhede, I. Key-recovery attacks on various RO PUF constructions via helper data manipulation. In Proc. Conf. Design, Automation & Test in Europe (IACR, 2014).

  41. Delvaux, J. & Verbauwhede, I. Attacking PUF-based pattern matching key generators via helper data manipulation. In CT-RSA 2014 106–131 (Springer, 2014).

  42. Becker, G. T. Robust fuzzy extractors and helper data manipulation attacks revisited: theory vs practice. IEEE Trans. Dependable Secur. Comput. 16, 783–795 (2019). This work examines vulnerabilities of various error correction code implementations under helper data manipulation attacks.

  43. Boyen, X. Reusable cryptographic fuzzy extractors. In Proc. 11th ACM Conf. Computer and Communications Security 82–91 (ACM, 2004).

  44. Van Herrewege, A. et al. Reverse fuzzy extractors: enabling lightweight mutual authentication for PUF-enabled RFIDs. In Proc. Financial Cryptography and Data Security 374–389 (Springer, 2012). Work that brought reverse fuzzy extractors to PUFs.

  45. Canetti, R., Fuller, B., Paneth, O., Reyzin, L. & Smith, A. Reusable fuzzy extractors for low-entropy distributions. In Annual Int. Conf. the Theory and Applications of Cryptographic Techniques 117–146 (Springer, 2016).

  46. Kusters, L. et al. Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios. In Proc. IEEE Int. Symp. Information Theory (ISIT) 1803–1807 (IEEE, 2017).

  47. Roel, M. Physically Unclonable Functions: Constructions, Properties and Applications. Ph.D. dissertation, KU Leuven (2012). Provides details of various PUF structures as well as empirical evaluation results of popular ones.

  48. Delvaux, J. Security Analysis of PUF-Based Key Generation and Entity Authentication. Ph.D. dissertation, Shanghai Jiao Tong Univ. (2017).

  49. Delvaux, J., Gu, D. & Verbauwhede, I. Upper bounds on the min-entropy of RO Sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs. In Hardware-Oriented Security and Trust (AsianHOST), IEEE Asian 1–6 (IEEE, 2016).

  50. Fuller, B., Meng, X. & Reyzin, L. Computational fuzzy extractors. In Proc. Conf. Theory and Application of Cryptology and Information Security 174–193 (Springer, 2013).

  51. Herder, C., Ren, L., van Dijk, M., Yu, M.-D. & Devadas, S. Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions. IEEE Trans. Dependable Secur. Comput. 14, 65–82 (2017). Construction of a fuzzy extractor through complexity theoretical arguments instead of previous information-theoretic arguments.

  52. Huth, C., Becker, D., Merchan, J. G., Duplys, P. & Güneysu, T. Securing systems with indispensable entropy: LWE-based lossless computational fuzzy extractor for the internet of things. IEEE Access 5, 11,909–11,926 (2017).

    Article  Google Scholar 

  53. Colombier, B., Bossuet, L., Fischer, V. & Hély, D. Key reconciliation protocols for error correction of silicon PUF responses. IEEE Trans. Inf. Forensics Security 12, 1988–2002 (2017).

    Article  Google Scholar 

  54. Maiti, A. & Schaumont, P. Improving the quality of a physical unclonable function using configurable ring oscillators. In Proc. IEEE Int. Conf. Field Programmable Logic and Applications 703–707 (IEEE, 2009).

  55. Maiti, A. & Schaumont, P. Improved ring oscillator PUF: an FPGA friendly secure primitive. J. Crypt. 24, 375–397 (2011).

  56. Maiti, A., Kim, I. & Schaumont, P. A robust physical unclonable function with enhanced challenge-response set. IEEE Trans. Inf. Forensics Security 7, 333–345 (2012).

    Article  Google Scholar 

  57. Cao, Y., Zhang, L., Chang, C.-H. & Chen, S. A low-power hybrid RO PUF with improved thermal stability for lightweight applications. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 34, 1143–1147 (2015).

  58. Liu, C. Q., Cao, Y. & Chang, C. H. ACRO-PUF: a low-power, reliable and aging-resilient current starved inverter-based ring oscillator physical unclonable function. IEEE Trans. Circuits Syst. I, Reg. Pap. 64, 3138–3149 (2017).

  59. Su, Y., Holleman, J. & Otis, B. P. A digital 1.6 pJ/bit chip identification circuit using process variations. IEEE J. Solid-State Circuits 43, 69–77 (2008).

    Article  Google Scholar 

  60. Maes, R., Tuyls, P. & Verbauwhede, I. Intrinsic PUFs from flip-flops on reconfigurable devices. In Proc. 3rd Benelux Workshop on Information and System Security (2008).

  61. van der Leest, V., Schrijen, G.-J., Handschuh, H. & Tuyls, P. Hardware intrinsic security from D flip-flops. In Proc. 5th ACM Workshop on Scalable Trusted Computing 53–62 (ACM, 2010).

  62. Kumar, S. S., Guajardo, J., Maes, R., Schrijen, G.-J. & Tuyls, P. The butterfly PUF protecting IP on every FPGA. In Proc. IEEE Int. Symp. Hardware-Oriented Security and Trust 67–70 (IEEE, 2008).

  63. Alioto, M. & Alvarez. A. Physically Unclonable Function Database (National Univ. of Singapore, accessed 7 January 2020); http://www.green-ic.org/pufdb

  64. Brzuska, C., Fischlin, M., Schröder, H. & Katzenbeisser, S. Physically uncloneable functions in the universal composition framework. In Annual Cryptology Conference 51–70 (Springer, 2011).

  65. Rührmair, U. & van Dijk, M. Practical security analysis of PUF-based two-player protocols. In Proc. Cryptographic Hardware and Embedded Systems 251–267 (Springer, 2012).

  66. Rührmair, U. & van Dijk, M. On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols. J. Crypt. Eng. 3, 17–28 (2013).

    Article  Google Scholar 

  67. Damgård, I. & Scafuro, A. Unconditionally secure and universally composable commitments from physical assumptions. In Proc. Int. Conf. Theory and Application of Cryptology and Information Security 100–119 (Springer, 2013).

  68. Rührmair, U. & Van Dijk, M. PUFs in security protocols: attack models and security evaluations. In Proc. IEEE Symp. Security and Privacy 286–300 (IEEE, 2013).

  69. Carro-Temboury, M. R., Arppe, R., Vosch, T. & Sørensen, T. J. An optical authentication system based on imaging of excitation-selected lanthanide luminescence. Sci. Adv. 4, e1701384 (2018).

    Article  Google Scholar 

  70. Rührmair, U. et al. Applications of high-capacity crossbar memories in cryptography. IEEE Trans. Nanotechnol. 10, 489–498 (2011).

    Article  Google Scholar 

  71. Lim, D. Extracting Secret Keys from Integrated Circuits. Ph.D. dissertation, MIT (2004).

  72. Kursawe, K., Sadeghi, A., Schellekens, D., Skoric, B. & Tuyls, P. Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage. In Proc. IEEE Int. Workshop on Hardware-Oriented Security and Trust 22–29 (IEEE, 2009).

  73. Majzoobi, M., Koushanfar, F. & Potkonjak, M. Techniques for design and implementation of secure reconfigurable PUFs. ACM Trans. Reconfigurable Tech. Syst. 2, 5 (2009).

    Article  Google Scholar 

  74. Mahmoodi, M., Nili, H., Larimian, S., Guo, X. & Strukov, D. Chipsecure: a reconfigurable analog eflash-based PUF with machine learning attack resiliency in 55 nm CMOS. In Proc. 56th Annual Design Automation Conference 8806766 (ACM, 2019).

  75. Katzenbeisser, S. et al. Recyclable PUFs: logically reconfigurable PUFs. J. Crypt. Eng. 1, 177–186 (2011).

  76. Rührmair, U., Jaeger, C., & Algasinger, M. An attack on PUF-based session key exchange and a hardware-based countermeasure: erasable PUFs. In Proc. Financial Cryptography and Data Security 190–204 (Springer, 2011).

  77. Beckmann. N & Potkonjak, M. Hardware-based public-key cryptography with public physically unclonable functions. In Inform. Hiding 5806, 206–220 (Springer, 2009).

  78. Rührmair, U. SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions (IACR, 2009); https://eprint.iacr.org/2009/255

  79. Rührmair, U. Towards Secret-Free Security (IACR, 2019); https://eprint.iacr.org/2019/388

  80. Majzoobi, M. & Koushanfar, F. Time-bounded authentication of FPGAs. IEEE Trans. Inf. Forensics Security 6, 1123–1135 (2011).

    Article  Google Scholar 

  81. Rajendran, J., Rose, G. S., Karri, R. & Potkonjak, M. Nano-PPUF: a memristor-based security primitive. In Proc. IEEE Computer Society Annual Symposium on VLSI 84–87 (IEEE, 2012).

  82. Wendt, J. B. & Potkonjak, M. The bidirectional polyomino partitioned PPUF as a hardware security primitive. In Proc. IEEE Global Conf. Signal and Information Processing 257–260 (IEEE, 2013).

  83. Potkonjak, M. & Goudar, V. Public physical unclonable functions. Proc. IEEE 102, 1142–1156 (2014).

    Article  Google Scholar 

  84. Chakraborty, R. S. & Bhunia, S. HARPOON: an obfuscation-based SoC design methodology for hardware protection. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 28, 1493–1502 (2009).

  85. Koushanfar, F. Provably secure active IC metering techniques for piracy avoidance and digital rights management. IEEE Trans. Inf. Forensics Security 7, 51–63 (2012).

    Article  Google Scholar 

  86. Zhang, J., Lin, Y., Lyu, Y. & Qu, G. A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing. IEEE Trans. Inf. Forensics Security 10, 1137–1150 (2015).

    Article  Google Scholar 

  87. Delvaux, J., Peeters, R., Gu, D. & Verbauwhede, I. A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv. (CSUR) 48, 26 (2015).

    Article  Google Scholar 

  88. Delvaux, J. & Verbauwhede, I. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. In Proc. IEEE Int. Symp. Hardware-Oriented Security and Trust (HOST) 137–142 (IEEE, 2013). Exploitation of the unreliability side-channel to perform modelling attacks on APUFs, which becomes a main attack surface.

  89. Hiller, M. et al. Low-area reed decoding in a generalized concatenated code construction for PUFs. In Proc. IEEE Computer Society Annual Symp. VLSI 143–148 (IEEE, 2015).

  90. Hiller, M. Key Derivation with Physical Unclonable Functions. Ph.D. dissertation, Technical Univ. Munich (2016).

  91. Xu, T. & Potkonjak, M. Digital PUF using intentional faults. In Proc. IEEE Int. Symp. Quality Electronic Design 448–451 (IEEE, 2015).

  92. Miao, J., Li, M., Roy, S. & Yu, B. LRR-DPUF: learning resilient and reliable digital physical unclonable function. In Proc. IEEE Int. Conf. Computer-Aided Design https://doi.org/10.1145/2966986.2967051 (IEEE, 2016).

  93. Bhargava, M. Mai, K. A high reliability PUF using hot carrier injection based response reinforcement. In Proc. Cryptographic Hardware and Embedded Systems 90–106 (Springer, 2013).

  94. Wang, W.-C., Yona, Y., Diggavi, S. & Gupta, P. LEDPUF: stability-guaranteed physical unclonable functions through locally enhanced defectivity. In Proc. IEEE Int. Symp. Hardware Oriented Security and Trust 25–30 (IEEE, 2016).

  95. Chuang, K.-H. et al. Physically unclonable function using CMOS breakdown position. In Proc. IEEE Reliability Physics Symp. (IRPS) 4C–1 (IEEE, 2017).

  96. Bhargava, M. & Mai, K. An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS. In Proc. Conf. Design, Automation & Test in Europe 6800284 (IEEE, 2014).

  97. Xu, X., Rahmati, A., Holcomb, D. E., Fu, K. & Burleson, W. Reliable physical unclonable functions using data retention voltage of SRAM cells. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 34, 903–914 (2015).

  98. Gao, Y., Ma, H., Al-Sarawi, S. F., Abbott, D. & Ranasinghe, D. C. PUF-FSM: a controlled strong PUF. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 64, 2532–2543 (2017).

  99. Zeitouni, S., Oren, Y., Wachsmann, C., Koeberl, P. & Sadeghi, A.-R. Remanence decay side-channel: the PUF case. IEEE Trans. Inf. Forensics Security 11, 1106–1116 (2016).

  100. Helfmeier, C., Boit, C., Nedospasov, D., & Seifert, J.-P. Cloning physically unclonable functions. In Proc. IEEE Int. Symp. Hardware-Oriented Security and Trust https://doi.org/10.1109/HST.2013.6581556 (IEEE, 2013).

  101. Tajik, S. et al. Photonic side-channel analysis of arbiter PUFs. J. Crypt. 30, 550–571 (2017).

    Article  Google Scholar 

  102. Boit, C. et al. From IC debug to hardware security risk: the power of backside access and optical interaction. In Proc. IEEE Int. Symp. the Physical and Failure Analysis of Integrated Circuits (IPFA) 365–369 (IEEE, 2016).

  103. Sauer, M. et al. Sensitized path PUF: a lightweight embedded physical unclonable function In Proc. IEEE Conf. Design, Automation & Test in Europe 680–685 (IEEE, 2017).

  104. Rührmair, U. et al. Efficient power and timing side channels for physical unclonable functions. In Proc. Cryptographic Hardware and Embedded Systems 476–492 (Springer, 2014). Side-channel attacks via power and timing information on PUFs.

  105. Becker, G. T. & Kumar, R. Active and Passive Side-Channel Attacks on Delay Based PUF Designs (IACR, 2014); https://eprint.iacr.org/2014/287

  106. Tiri, K., Akmal, M. & Verbauwhede, I. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In Proc. 28th European Solid-State Circuits Conf. 403–406 (IEEE, 2002).

  107. Delvaux, J. Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs. IEEE Trans. Inf. Foren. Sec. 14, 2043–2058 (2019).

    Article  Google Scholar 

  108. He, J., Zhao, Y., Guo, X. & Jin, Y. Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Trans. VLSI Syst. 25, 2939–2948 (2017).

  109. Rostami, M., Koushanfar, F. & Karri, R. A primer on hardware security: models, methods, and metrics. Proc. IEEE 102, 1283–1295 (2014).

  110. Avvaru, S. & Parhi, K. K. Feed-forward XOR PUFs: reliability and attack-resistance analysis. In Proc. Great Lakes Symp. VLSI. 287–290 (ACM, 2019).

  111. Yu M.-D. & Devadas, S. Recombination of physical unclonable functions. In GOMACTech-10 Conference http://hdl.handle.net/1721.1/59817 (United States Dept. of Defence, 2010).

  112. Vijayakumar, A., Patil, V. C., Prado, C. B. & Kundu, S. Machine learning resistant strong PUF: possible or a pipe dream? In Proc. IEEE Int. Symp. Hardware Oriented Security and Trust (HOST) 19–24 (IEEE, 2016).

  113. Biggio, B. & Roli, F. Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317–331 (2018).

  114. Wang, S.-J., Chen, Y.-S. & Li, K. S.-M. Adversarial attack against modeling attack on PUFs. In Proc. ACM 56th Annual Design Automation Conf. 8806766 (ACM, 2019).

  115. Tuyls, P. et al. Read-proof hardware from protective coatings. In Proc. Cryptographic Hardware and Embedded Systems 369–383 (Springer, 2006).

  116. Immler, V., Obermaier, J., König, M., Hiller, M. & Sig, G. B-TREPID: batteryless tamper-resistant envelope with a PUF and integrity detection. In Proc. IEEE Int. Symp. Hardware Oriented Security and Trust 49–56 (IEEE, 2018).

  117. Obermaier, J., Hiller, M., Immler, V. & Sigl, G. A measurement system for capacitive PUF-based security enclosures. In Proc. Design Automation Conf. https://doi.org/10.1109/DAC.2018.8465886 (IEEE, 2018).

  118. Anderson, B. R., Gunawidjaja, R. & Eilers, H. Initial tamper tests of novel tamper-indicating optical physical unclonable functions. Appl. Opt. 56, 2863–2872 (2017).

    Article  Google Scholar 

  119. Gassend, B., Clarke, D., Van Dijk, M. & Devadas, S. Controlled physical random functions. In Proc. 18th IEEE Annual Computer Security Applications Conference 149–160 (IEEE, 2002).

  120. Gassend, B. et al. Controlled physical random functions and applications. ACM Trans. Inform. Syst. Sec. 10, 3 (2008).

  121. Liu, R., Wu, H., Pang, Y., Qian, H. & Yu, S. A highly reliable and tamper-resistant RRAM PUF: design and experimental validation. In Proc. IEEE Int. Symp. Hardware Oriented Security and Trust 13–18 (IEEE, 2016).

  122. Gao, Y., Su, Y., Xu, L. & Ranasinghe, D. C. Lightweight (reverse) fuzzy extractor with multiple reference PUF responses. IEEE Trans. Inf. Foren. Sec. 14, 1887–1901 (2019).

    Article  Google Scholar 

  123. Xu, X., Burleson, W. & Holcomb, D. E. Using statistical models to improve the reliability of delay-based PUFs. In Proc. IEEE Computer Society Annual Symposium on VLSI 547–552 (IEEE, 2016).

  124. Holcomb, D. E., Burleson, W. P. & Fu, K. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58, 1198–1210 (2009).

  125. Keller, C., Gurkaynak, F., Kaeslin, H. & Felber, N. Dynamic memory-based physically unclonable function for the generation of unique identifiers and true random numbers. In Proc. IEEE Int. Symp. Circuits and Systems 2740–2743 (IEEE, 2014).

  126. Ranasinghe, D. C., Lim, D., Devadas, S., Abbott, D. & Cole, P. H. Random numbers from metastability and thermal noise. Electron. Lett. 41, 891–893 (2005).

  127. Gao, Y., Ma, H., Abbott, D. & Al-Sarawi, S. F. PUF sensor: exploiting PUF unreliability for secure wireless sensing. IEEE Trans. Circuits Syst. I: Reg. Pap. 64, 2532–2543 (2017).

    Article  Google Scholar 

  128. Rosenfeld, K., Gavas, E., & Karri, R. Sensor physical unclonable functions. In Proc. IEEE. Int. Symp. Hardware-Oriented Security and Trust (HOST) 112–117 (IEEE 2010).

  129. Guo, Z., Xu, X., Rahman, M. T., Tehranipoor, M. M. & Forte, D. SCARe: an SRAM-based countermeasure against IC recycling. IEEE Trans. VLSI Syst. 26, 744–755 (2018).

  130. Rührmair, U. et al. Virtual proofs of reality and their physical implementation. In Proc. 36th IEEE Symp. Security and Privacy 70–85 (IEEE, 2015).

  131. Herder, C., Fuller, B., van Dijk, M. & Devadas, S. Public Key Cryptosystems with Noisy Secret Keys (IACR, 2017); https://eprint.iacr.org/2017/210 (2017).

  132. Islam, M. N. & Kundu, S. Enabling IC traceability via blockchain pegged to embedded PUF. ACM Trans. Des. Autom. Electron. Syst. 24, 36 (2019).

  133. Scheel, R. A. & Tyagi, A. Characterizing composite user-device touchscreen physical unclonable functions for mobile device authentication. In Proc. 5th Int. Workshop on Trustworthy Embedded Devices 3–13 (ACM, 2015).

  134. Yu, S. & Chen, P.-Y. Emerging memory technologies: recent trends and prospects. IEEE Solid-State Circ. Mag. 8, 43–56 (2016).

    Article  Google Scholar 

  135. Wong, H.-S. P. & Salahuddin, S. Memory leads the way to better computing. Nat. Nanotechnol. 10, 191–194 (2015).

    Article  Google Scholar 

  136. Gao, Y., Ranasinghe, D. C., Al-Sarawi, S. F., Kavehei, O. & Abbott, D. Emerging physical unclonable functions with nanotechnology. IEEE Access 4, 61–80 (2016).

    Article  Google Scholar 

  137. Carboni, R. & Ielmini, D. Stochastic memory devices for security and computing. Adv. Electron. Mat. 5, 1900198 (2019).

    Article  Google Scholar 

  138. Zhang, L., Kong, Z. H. & Chang, C.-H. PCKGen: a phase change memory based cryptographic key generator. In Proc. IEEE Int. Symp. Circuits and Systems 1444–1447 (IEEE, 2013).

  139. Che, W., Plusquellic, J. & Bhunia, S. A non-volatile memory based physically unclonable function without helper data. In Proc. IEEE/ACM Int. Conf. Computer-Aided Design 148–153 (IEEE, 2014).

  140. Pang, Y. et al. A reconfigurable RRAM physically unclonable function utilizing post-process randomness source with <6×10−6 native bit error rate. In IEEE Int. Solid-State Circuits Conference-(ISSCC) 402–404 (IEEE, 2019).

  141. Xie, Y. et al. Security and vulnerability implications of 3D ICs. IEEE Trans. Multi-Scale Comput. Syst. 2, 108–122 (IEEE, 2016).

  142. Gao, Y., Ranasinghe, D. C., Al-Sarawi, S. F., Kavehei, O. & Abbott, D. Memristive crypto primitive for building highly secure physical unclonable functions. Sci. Rep. 5, 12785 (2015).

    Article  Google Scholar 

  143. Nili, H. et al. Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors. Nat. Electron. 1, 197–202 (2018).

    Article  Google Scholar 

  144. Lee, G. S., Kim, G.-H., Kwak, K., Jeong, D. S. & Ju, H. Enhanced reconfigurable physical unclonable function based on stochastic nature of multilevel cell RRAM. IEEE Trans. Electron Devices 66, 1717–1721 (2019).

    Article  Google Scholar 

  145. Karam, R., Liu, R., Chen, P.-Y., Yu, S. & Bhunia, S. Security primitive design with nanoscale devices: a case study with resistive RAM. In Proc. IEEE International Great Lakes Symposium on VLSI 299–304 (IEEE, 2016).

  146. IoT connected devices to reach 20.4 billion by 2020, says Gartner. Which-50 https://go.nature.com/386hJ0q (2017).

  147. Lim, D. et al. Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13, 1200–1205 (2005).

    Article  Google Scholar 

  148. Delvaux, J. & Verbauwhede, I. Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. IEEE Trans. Circuits Syst. I: Reg. Pap. 61, 1701–1713 (2014).

    Article  Google Scholar 

  149. Ganji, F., Krämer, J., Seifert, J.-P. & Tajik, S. Lattice basis reduction attack against physically unclonable functions. In Proc. ACM Conf. Computer and Communications Security 1070–1080 (ACM, 2015).

  150. Merli, D. et al. Localized electromagnetic analysis of RO PUFs. In Int. IEEE Symp. Hardware-Oriented Security and Trust 19–24 (IEEE, 2013).

  151. Nguyen, P. H., Sahoo, D. P., Chakraborty, R. S. & Mukhopadhyay, D. Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. In Proc. Design, Automation & Test in Europe Conference & Exhibition 641–646 (EDA Consortium, 2015).

Download references

Acknowledgements

We acknowledge support from NJUST Research Start-Up Funding (AE89991/039) and National Natural Science Foundation of China (61802186).

Author information

Authors and Affiliations

Authors

Contributions

Y.G., S.F.A.-S. and D.A. conceived the project, carried out the discussions and wrote the manuscript.

Corresponding authors

Correspondence to Yansong Gao, Said F. Al-Sarawi or Derek Abbott.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Supplementary Information

Supplementary Sections 1–7.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gao, Y., Al-Sarawi, S.F. & Abbott, D. Physical unclonable functions. Nat Electron 3, 81–91 (2020). https://doi.org/10.1038/s41928-020-0372-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/s41928-020-0372-5

This article is cited by

Search

Quick links

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics