A memristor fingerprinting and characterisation methodology for hardware security
Abstract The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely i...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2023-06-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-023-33051-z |
_version_ | 1797806769384194048 |
---|---|
author | Callum Aitchison Basel Halak Alex Serb Themis Prodromakis |
author_facet | Callum Aitchison Basel Halak Alex Serb Themis Prodromakis |
author_sort | Callum Aitchison |
collection | DOAJ |
description | Abstract The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a $$\text {TiO}_x$$ TiO x memristor technology, and shown to be able to identify cells in a set. |
first_indexed | 2024-03-13T06:12:23Z |
format | Article |
id | doaj.art-464f12c0690e416ab9b5413dfe1e8ebe |
institution | Directory Open Access Journal |
issn | 2045-2322 |
language | English |
last_indexed | 2024-03-13T06:12:23Z |
publishDate | 2023-06-01 |
publisher | Nature Portfolio |
record_format | Article |
series | Scientific Reports |
spelling | doaj.art-464f12c0690e416ab9b5413dfe1e8ebe2023-06-11T11:11:04ZengNature PortfolioScientific Reports2045-23222023-06-011311910.1038/s41598-023-33051-zA memristor fingerprinting and characterisation methodology for hardware securityCallum Aitchison0Basel Halak1Alex Serb2Themis Prodromakis3Electronics and Computer Science, University of SouthamptonElectronics and Computer Science, University of SouthamptonCentre for Electronics Frontiers, Institute for Integrated Micro and Nano Systems, School of Engineering, The University of EdinburghCentre for Electronics Frontiers, Institute for Integrated Micro and Nano Systems, School of Engineering, The University of EdinburghAbstract The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a $$\text {TiO}_x$$ TiO x memristor technology, and shown to be able to identify cells in a set.https://doi.org/10.1038/s41598-023-33051-z |
spellingShingle | Callum Aitchison Basel Halak Alex Serb Themis Prodromakis A memristor fingerprinting and characterisation methodology for hardware security Scientific Reports |
title | A memristor fingerprinting and characterisation methodology for hardware security |
title_full | A memristor fingerprinting and characterisation methodology for hardware security |
title_fullStr | A memristor fingerprinting and characterisation methodology for hardware security |
title_full_unstemmed | A memristor fingerprinting and characterisation methodology for hardware security |
title_short | A memristor fingerprinting and characterisation methodology for hardware security |
title_sort | memristor fingerprinting and characterisation methodology for hardware security |
url | https://doi.org/10.1038/s41598-023-33051-z |
work_keys_str_mv | AT callumaitchison amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT baselhalak amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT alexserb amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT themisprodromakis amemristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT callumaitchison memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT baselhalak memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT alexserb memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity AT themisprodromakis memristorfingerprintingandcharacterisationmethodologyforhardwaresecurity |