Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †
Nikolaos Athanasios Anagnostopoulos,
Tolga Arul,
Yufan Fan,
Christian Hatzfeld,
André Schaller,
Wenjie Xiong,
Manishkumar Jain,
Muhammad Umair Saleem,
Jan Lotichius,
Sebastian Gabmeyer,
Jakub Szefer,
Stefan Katzenbeisser
Affiliations
Nikolaos Athanasios Anagnostopoulos
Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, Germany
Tolga Arul
Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, Germany
Yufan Fan
Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, Germany
Christian Hatzfeld
Measurement and Sensor Technology, Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, Germany
André Schaller
Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, Germany
Wenjie Xiong
Computer Architecture and Security Laboratory, Department of Electrical Engineering, Yale University, 10 Hillhouse Avenue, New Haven, CT 06520, USA
Manishkumar Jain
Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, Germany
Muhammad Umair Saleem
Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, Germany
Jan Lotichius
Measurement and Sensor Technology, Department of Electrical Engineering and Information Technology, Technical University of Darmstadt, S3|06, Merckstraße 25, Darmstadt, 64283 Hessen, Germany
Sebastian Gabmeyer
Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, Germany
Jakub Szefer
Computer Architecture and Security Laboratory, Department of Electrical Engineering, Yale University, 10 Hillhouse Avenue, New Haven, CT 06520, USA
Stefan Katzenbeisser
Security Engineering Group, Computer Science Department, Technical University of Darmstadt, Mornewegstraße 32, S4|14, Darmstadt, 64293 Hessen, Germany
Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic protocols. However, as recent work has demonstrated, the times needed in order to generate their responses may prohibit their widespread usage. To address this issue, the Row Hammer PUF has been proposed by Schaller et al., which leverages the row hammer effect in DRAM modules to reduce the retention times of their cells and, therefore, significantly speed up the generation times for the responses of PUFs based on these retention times. In this work, we extend the work of Schaller et al. by presenting a run-time accessible implementation of this PUF and by further reducing the time required for the generation of its responses. Additionally, we also provide a more thorough investigation of the effects of temperature variations on the Row Hammer PUF and briefly discuss potential statistical relationships between the cells used to implement it. As our results prove, the Row Hammer PUF could potentially provide an adequate level of security for Commercial Off-The-Shelf (COTS) devices, if its dependency on temperature is mitigated, and, may therefore, be commercially adopted in the near future.