Run-time Accessible DRAM PUFs in Commodity Devices

29.11.2016, 15:30 – 17:00

2016/11/29 15:30-17:00

Speaker: Wenjie Xiong | Location: Mornewegstraße 32 (S4|14), Room 5.3.01, Darmstadt

Organizer: CROSSING


A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of hardware, which emerges due to variations in the fabrication processes. Prior works have demonstrated that PUFs are a promising cryptographic primitive to enable secure key storage, hardware-based device authentication and identification. So far, most PUF constructions require addition of new hardware or FPGA implementations for their operation. Recently, intrinsic PUFs, which can be found in commodity devices, have been investigated. Unfortunately, most of them suffer from the drawback that they can only be accessed at boot time.

This paper is the first to enable the run-time access of decay-based intrinsic DRAM PUFs in commercial off-the-shelf systems, which requires no additional hardware or FPGAs. A key advantage of our PUF construction is that it can be queried during run-time of a Linux system. Furthermore, by exploiting different decay times of individual DRAM cells, the challenge-response space is increased. Finally, we introduce lightweight protocols for device authentication and secure channel establishment, that leverage the DRAM PUFs at run-time.

Short Bio

Wenjie is currently a Ph.D. candidate in the Department of Electrical Engineering at the Yale University under the supervision of Prof. Jakub Szefer. Her interests are in hardware security and secure computer architectures. She received her B.Sc. in Microelectronics and Psychology from Peking University.