{"id":1259,"date":"2020-12-28T09:21:29","date_gmt":"2020-12-28T09:21:29","guid":{"rendered":"https:\/\/blog.pufsecurity.com\/?p=1259"},"modified":"2023-11-30T02:59:49","modified_gmt":"2023-11-30T02:59:49","slug":"2020-security-on-chip-tech-forum-highlights","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hans\/document\/2020-security-on-chip-tech-forum-highlights\/","title":{"rendered":"2020 Security on Chip Tech Forum Highlights"},"content":{"rendered":"\n

On Thursday December 3rd<\/sup>, 2020, PUFsecurity and eMemory along with our co-organizers, The Ministry of Science and Technology, IEEE CAS, and the Program Office of Semiconductor Manufacturing and Design for AI Edge, hosted a Security on Chip Tech Forum. The event took place at the Taiwan Semiconductor Research Institute (TSRI) and was a whole day event composed of three main talks given by PUFsecurity employees. The talks were divided into three main themes: \u201cPUF-From Circuit Implementation to Security Applications\u201d, \u201cChip security requirements, functions and mechanism\u201d, and \u201cThe composition, function, and security operation of the root-of-trust\u201d. Around 60 guests were in attendance, ranging from engineers to sales, management-level executives, researchers, and those from academia. All were eager to learn more about the hot topic of hardware security: PUF (Physically Unclonable Function) and PUF-based security solutions and applications.<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

Talk 1: PUF-From Circuit Implementation to Security Application<\/strong><\/p>\n\n\n\n

The first lecture was given by Dr. Kent Chuang, one of PUFsecurity\u2019s talented engineers. In his talk, he introduced several PUFs, such as the SRAM-PUF and the recently released quantum tunneling PUF (NeoPUF). The talk explains in detail the characteristics of PUFs. It also runs through several practical examples to demonstrate how to calculate min-entropy, estimate uniqueness, randomness, etc. For various PUFs CRPs, the speaker conducted an in-depth discussion and explained how PUF serves as an important security foundation in specific application areas.<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

\/Q&A\/<\/strong><\/p>\n\n\n\n

Q1: When it comes to non-volatile and volatile PUFs, is one more stable and secure than the other when being attacked?<\/strong><\/p>\n\n\n\n

A1: Let\u2019s use the examples of SRAM PUF as a volatile PUF and NeoPUF as a non-volatile PUF to explain. Although an NVM-PUF (NeoPUF) requires additional effort on anti-tampering techniques compared to volatile PUFs (SRAM PUF), the effort is still considered much less than what is required to keep SRAM PUFs fully stable.<\/p>\n\n\n\n

Q2: If a Volatile PUF is used as a dynamic entropy, what are the advantages and disadvantages?<\/strong><\/p>\n\n\n\n

A2: If a Volatile PUF is used as a dynamic entropy, you must first determine whether to use the cell as a PUF or as an entropy. The procedure is more complicated and fewer people use it in that way.<\/p>\n\n\n\n

Q3: How do you solve the problem of bit flips caused by frequency and voltage variations in the Oscillator PUF circuit?<\/strong><\/p>\n\n\n\n

A3: We usually use an Error Correcting Code (ECC) to solve it<\/p>\n\n\n\n