A memristor fingerprinting and characterisation methodology for hardware security

Abstract The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely i...

Full description

Bibliographic Details
Main Authors: Callum Aitchison, Basel Halak, Alex Serb, Themis Prodromakis
Format: Article
Language:English
Published: Nature Portfolio 2023-06-01
Series:Scientific Reports
Online Access:https://doi.org/10.1038/s41598-023-33051-z
_version_ 1797806769384194048
author Callum Aitchison
Basel Halak
Alex Serb
Themis Prodromakis
author_facet Callum Aitchison
Basel Halak
Alex Serb
Themis Prodromakis
author_sort Callum Aitchison
collection DOAJ
description Abstract The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a $$\text {TiO}_x$$ TiO x memristor technology, and shown to be able to identify cells in a set.
first_indexed 2024-03-13T06:12:23Z
format Article
id doaj.art-464f12c0690e416ab9b5413dfe1e8ebe
institution Directory Open Access Journal
issn 2045-2322
language English
last_indexed 2024-03-13T06:12:23Z
publishDate 2023-06-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj.art-464f12c0690e416ab9b5413dfe1e8ebe2023-06-11T11:11:04ZengNature PortfolioScientific Reports2045-23222023-06-011311910.1038/s41598-023-33051-zA memristor fingerprinting and characterisation methodology for hardware securityCallum Aitchison0Basel Halak1Alex Serb2Themis Prodromakis3Electronics and Computer Science, University of SouthamptonElectronics and Computer Science, University of SouthamptonCentre for Electronics Frontiers, Institute for Integrated Micro and Nano Systems, School of Engineering, The University of EdinburghCentre for Electronics Frontiers, Institute for Integrated Micro and Nano Systems, School of Engineering, The University of EdinburghAbstract The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a $$\text {TiO}_x$$ TiO x memristor technology, and shown to be able to identify cells in a set.https://doi.org/10.1038/s41598-023-33051-z
spellingShingle Callum Aitchison
Basel Halak
Alex Serb
Themis Prodromakis
A memristor fingerprinting and characterisation methodology for hardware security
Scientific Reports
title A memristor fingerprinting and characterisation methodology for hardware security
title_full A memristor fingerprinting and characterisation methodology for hardware security
title_fullStr A memristor fingerprinting and characterisation methodology for hardware security
title_full_unstemmed A memristor fingerprinting and characterisation methodology for hardware security
title_short A memristor fingerprinting and characterisation methodology for hardware security
title_sort memristor fingerprinting and characterisation methodology for hardware security
url https://doi.org/10.1038/s41598-023-33051-z
work_keys_str_mv AT callumaitchison amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT baselhalak amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT alexserb amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT themisprodromakis amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT callumaitchison memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT baselhalak memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT alexserb memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity
AT themisprodromakis memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity