{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:42:28Z","timestamp":1760240548770,"version":"build-2065373602"},"reference-count":27,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T00:00:00Z","timestamp":1563321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries. Hardware obfuscation and IP locking can be used to make a design secure by replacing a part of the circuit with a key-locked module. In order to ensure each chip has unique keys, previous work has proposed using physical unclonable functions (PUF) to lock the circuit. However, these designs are area intensive. In this work, we propose a strong PUF-based hardware obfuscation scheme to uniquely lock each chip.<\/jats:p>","DOI":"10.3390\/cryptography3030017","type":"journal-article","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T11:25:12Z","timestamp":1563362712000},"page":"17","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Key Generation for Hardware Obfuscation Using Strong PUFs"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3807-5465","authenticated-orcid":false,"given":"Md Shahed","family":"Enamul Quadir","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT 06269-4157, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3449-3205","authenticated-orcid":false,"given":"John A.","family":"Chandy","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT 06269-4157, USA"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1109\/JPROC.2014.2332291","article-title":"Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain","volume":"102","author":"Guin","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Rostami, M., Koushanfar, F., Rajendran, J., and Karri, R. (2013, January 18\u201321). Hardware security: Threat models and metrics. Proceedings of the International Conference on Computer-Aided Design, San Jose, CA, USA.","DOI":"10.1109\/ICCAD.2013.6691207"},{"key":"ref_3","first-page":"6","article-title":"A survey on chip to system reverse engineering","volume":"13","author":"Quadir","year":"2016","journal-title":"ACM J. Emerg. Technol. Comput. Syst. (JETC)"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Roy, J.A., Koushanfar, F., and Markov, I.L. (2008, January 10\u201314). EPIC: Ending piracy of integrated circuits. Proceedings of the Conference on Design, Automation and Test in Europe, Munich, Germany.","DOI":"10.1145\/1403375.1403631"},{"key":"ref_5","unstructured":"Baumgarten, A.C. (2009). Preventing Integrated Circuit Piracy Using Reconfigurable Logic Barriers. [Ph.D. Thesis, Iowa State University]."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Rajendran, J., Pino, Y., Sinanoglu, O., and Karri, R. (2012, January 3\u20137). Security analysis of logic obfuscation. Proceedings of the 49th Annual Design Automation Conference, San Francisco, CA, USA.","DOI":"10.1145\/2228360.2228377"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1109\/TCAD.2009.2028166","article-title":"HARPOON: An obfuscation-based SoC design methodology for hardware protection","volume":"28","author":"Chakraborty","year":"2009","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Rajendran, J., Sam, M., Sinanoglu, O., and Karri, R. (2013, January 4\u20138). Security analysis of integrated circuit camouflaging. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2516656"},{"key":"ref_9","unstructured":"Alkabani, Y., and Koushanfar, F. (2007, January 6\u201310). Active Hardware Metering for Intellectual Property Protection and Security. Proceedings of the USENIX Security Symposium, Boston, MA, USA."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.micpro.2015.11.017","article-title":"Higher security of ASIC fabrication process against reverse engineering attack using automatic netlist encryption methodology","volume":"42","author":"Zamanzadeh","year":"2016","journal-title":"Microprocess. Microsyst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Khaleghi, S., Da Zhao, K., and Rao, W. (2015, January 19\u201322). IC piracy prevention via design withholding and entanglement. Proceedings of the 20th Asia and South Pacific Design Automation Conference, Chiba, Japan.","DOI":"10.1109\/ASPDAC.2015.7059112"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Koushanfar, F. (2012). Hardware metering: A survey. Introduction to Hardware Security and Trust, Springer.","DOI":"10.1007\/978-1-4419-8080-9_5"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MDT.2010.24","article-title":"Preventing IC piracy using reconfigurable logic barriers","volume":"27","author":"Baumgarten","year":"2010","journal-title":"IEEE Des. Test Comput."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Khaleghi, S., and Rao, W. (2018, January 8\u201311). Hardware Obfuscation Using Strong PUFs. Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Hong Kong, China.","DOI":"10.1109\/ISVLSI.2018.00066"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wendt, J.B., and Potkonjak, M. (2014, January 2\u20136). Hardware obfuscation using PUF-based logic. Proceedings of the 2014 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA.","DOI":"10.1109\/ICCAD.2014.7001362"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/TIFS.2011.2163307","article-title":"Provably secure active IC metering techniques for piracy avoidance and digital rights management","volume":"7","author":"Koushanfar","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., and Khandelwal, V. (2008, January 16\u201317). Design and implementation of PUF-based \u2019unclonable\u2019 RFID ICs for anti-counterfeiting and security applications. Proceedings of the 2008 IEEE International Conference on RFID, Las Vegas, NV, USA.","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical unclonable functions and applications: A tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1840021","DOI":"10.1142\/S0129156418400219","article-title":"Low Pass Filter PUF: Authentication of Printed Circuit Boards Based on Resistor and Capacitor Variations","volume":"27","author":"Quadir","year":"2018","journal-title":"Int. J. High Speed Electron. Syst."},{"key":"ref_20","unstructured":"Alkabani, Y., Koushanfar, F., and Potkonjak, M. (2007, January 5\u20138). Remote activation of ICs for piracy prevention and digital right management. Proceedings of the 2007 IEEE\/ACM International Conference on Computer-Aided Design, San Jose, CA, USA."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/s41635-018-0036-3","article-title":"Development and Evaluation of Hardware Obfuscation Benchmarks","volume":"2","author":"Amir","year":"2018","journal-title":"J. Hardw. Syst. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., and Schmidhuber, J. (2010, January 4\u20138). Modeling attacks on physical unclonable functions. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866335"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Becker, G.T. (2015, January 13\u201316). The gap between promise and reality: On the insecurity of XOR arbiter PUFs. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Saint Malo, France.","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MDT.2010.25","article-title":"Secure and robust error correction for physical unclonable functions","volume":"27","author":"Yu","year":"2010","journal-title":"IEEE Des. Test Comput."},{"key":"ref_25","first-page":"5","article-title":"Techniques for design and implementation of secure reconfigurable PUFs","volume":"2","author":"Majzoobi","year":"2009","journal-title":"ACM Trans. Reconfigurable Technol. Syst. (TRETS)"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Meguerdichian, S., and Potkonjak, M. (2011, January 5\u20139). Device aging-based physically unclonable functions. Proceedings of the 2011 48th ACM\/EDAC\/IEEE Design Automation Conference (DAC), New York, NY, USA.","DOI":"10.1145\/2024724.2024793"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MDT.2012.2205997","article-title":"Hardware IP protection during evaluation using embedded sequential trojan","volume":"29","author":"Narasimhan","year":"2012","journal-title":"IEEE Des. Test Comput."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/3\/17\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:06:27Z","timestamp":1760187987000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/3\/17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,17]]},"references-count":27,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["cryptography3030017"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3030017","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2019,7,17]]}}}