Instructional Leadership, emphasis: K-12 School Leadership (MEd)
Wires that are connected to a computer.

Physical Unclonable Functions (PUFs) to Secure Data and Detect Corruption


Description

This technology uses physical unclonable functions (PUFs) to mitigate data corruption resulting from malicious attacks, software bugs, or harsh environments. A technique is implemented to provide redundant data that cannot be predicted by an attacker, with the redundant data being generated in such a way that it differs from chip to chip. The main principle relies on data storage in addition to the functional, sensitive data, a tamper-proof tag uniquely linked to the sensitive data and the chip. The tamper-proof tag is a PUF response to a challenge, dependent on the data to be stored. Both the sensitive data and the tag are stored in the memory, next to each other. When the computing unit loads (reads back) the data, the PUF is concurrently challenged. At this time, the associated tag and data are compared and send an alarm if corruption is detected.

Additional information

Patent number and inventor

17/018,493

Bertrand Cambou, Paul G. Flikkema, and David Hely.

Potential applications

This technology is designed for use in cybersecurity.

Benefits and advantages

This technology addresses the security and safety issues induced by malicious or natural data corruption in integrated circuits. When using PUFs to secure redundant data, the target data is protected from corruption by hackers. Even if an attacker finds a way to corrupt data for a given chip, the attack would not be effective on another chip due to the differing data between chips.

Case number and licensing status

2019-049

This invention is available for licensing.