Cross-Architecture and Device PUF Dataset

Citation Author(s):
ENAS
ABULIBDEH
System on Chip Lab, Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi 127788, UAE
Hani
Saleh
System on Chip Lab, Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi 127788, UAE
Baker
Mohammad
System on Chip Lab, Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi 127788, UAE
Mahmoud
Al-Qutayri
System on Chip Lab, Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi 127788, UAE
Submitted by:
Enas Abulibdeh
Last updated:
Tue, 05/07/2024 - 13:16
DOI:
10.21227/2581-8y14
License:
0
0 ratings - Please login to submit your rating.

Abstract 

The security of systems with limited resources is essential for deployment and cannot be compromised by other performance metrics such as throughput. Physically Unclonable Functions (PUFs) present a promising, cost-effective solution for various security applications, including IC counterfeiting and lightweight authentication. PUFs, as security blocks, exploit physical variations to extract intrinsic responses based on applied challenges, with Challenge-Response Pairs (CRPs) uniquely defining each device. Security analysis based on CRPs evaluates the block's resistance against general and modeling-based attacks. This dataset comprises CRP sets collected from two different designs of digital-based PUFs implemented on a Field Programmable Gate Array (FPGA). For each design, the dataset was collected from 50 FPGAs using the same input challenge file. From each device, 5K records were collected for the first design and 10K records for the second design. Additionally, CRP sets under voltage or temperature variation were extracted from the same device, using the same input challenge under different environmental conditions.

Funding Agency: 
Technology Innovation Institute (TII)
Grant Number: 
EX2021-005