帳號:guest(216.73.216.146)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):謝慶威
作者(外文):Hsieh, Ching-Wei
論文名稱(中文):防止數位微流體生物晶片之侵權行為
論文名稱(外文):Piracy Prevention of Digital Microfluidic Biochips
指導教授(中文):何宗易
指導教授(外文):Ho, Tsung-Yi
口試委員(中文):黃俊達
李淑敏
口試委員(外文):Huang, Juinn-Dar
Li, Shu-Min
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系所
學號:104062609
出版年(民國):106
畢業學年度:105
語文別:英文
論文頁數:36
中文關鍵詞:侵權數位微流體生物晶片
外文關鍵詞:PiracyDMFB
相關次數:
  • 推薦推薦:0
  • 點閱點閱:1311
  • 評分評分:*****
  • 下載下載:15
  • 收藏收藏:0
數位微流體生物晶片因為低消耗、便利攜帶性和高效率的關係,在現今的健康照護產業中扮演著重要角色。根據最新的市場調查報告,生物晶片的市值成長率是往年的兩倍以上。然而隨著市值的巨大成長,利用侵權行為來獲取不法所得也成了一大威脅。為了防止侵權行為,傳統方法上是利用密鑰來授權。然而,數位微流體生物晶片上並沒有複雜的記憶體和邏輯閘來儲存密鑰,因此設計防護方法變得更加困難。在這篇論文中,我們提出了第一個利用最新物理不可克隆函數(PUF)來授權數位微流體生物晶片的防護方法。我們提出的物理不可克隆函數(PUF)利用了數位微流體生物晶片上固有的變異來生產密鑰,因此不需要使用記憶體。最後,我們分析了提出的方法的安全性,實驗也顯示出此方法的可行性。
Digital microfluidic biochips (DMFBs) play an important role in the healthcare industry due to its advantages such as low-cost, portability, and efficiency. According to the recent market report, the growth of biochips market is twice than before. However, as the
enormous business opportunities grow, piracy attacks, which are exploited by unscrupulous people to gain illegal profits, become a severe threat to DMFBs. To prevent piracy attacks, the conventional approach uses secret keys to perform authentication. Nevertheless,
DMFBs only consist of electrodes to control the operations of droplets, and there are no memories and logic gates integrated on it to store secret keys. This makes designing secure defenses of DMFBs against piracy attacks more dicult. Thus, in this thesis, we propose the first authentication method for piracy prevention of DMFBs based on a novel Physical Unclonable Function (PUF). The proposed PUF utilizes the inherent variation of electrodes on DMFBs to generate secret keys, so it does not require memory. Experimental
results demonstrate the feasibility of our proposed PUF. Finally, we analyze the security of the proposed method against piracy attacks.
Acknowledgement i
Abstract ii
1 Introduction 1
1.1 Digital Microfluidic Biochip . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Motivations for attacking DMFBs . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Security Vulnerabilities of DMFBs . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Digital Right Management . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Physical Unclonable Function . . . . . . . . . . . . . . . . . . . . . . . . 4
1.6 Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Background 6
2.1 Digital Microfluidic Biochip (DMFB) . . . . . . . . . . . . . . . . . . . . 6
2.1.1 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1.2 Design Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2 Piracy Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2.1 Piracys impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3 Physical Unclonable Function (PUF) . . . . . . . . . . . . . . . . . . . . . 12
iii
2.3.1 PUF classification . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3 DRM model for DMFBs 15
3.1 Design Flow of DMFBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.2 Principle of the DRM Process . . . . . . . . . . . . . . . . . . . . . . . . 17
3.3 Lock/Unlock DMFBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3.1 Lock method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3.2 Unlock method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4 Developed PUFs for DMFBs 23
4.1 Route PUF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2 Split PUF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.3 Experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
5 The Security Analysis 30
5.1 Brute force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.2 Simulating PUF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.3 Reverse engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.4 Counterfeiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6 Conclusion 32
References 33
[1] S. S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty, and R. Karri, “Security assessment
of cyberphysical digital microfluidic biochips,” IEEE/ACM Transactions on
Computational Biology and Bioinformatics, vol. 13, pp. 445–458, 2016.
[2] G. E. Suh and S. Devadas, “Physical unclonable functions for device authentication
and secret key generation,” in Proceedings of ACM/IEEE Design Automation Conference,
pp. 9–14, 2007.
[3] J. Zhang, Y. Lin, Y. Lyu, and G. Qu, “A puf-fsm binding scheme for fpga ip protection
and pay-per-device licensing,” IEEE Transactions on Information Forensics and
Security, vol. 10, pp. 1137–1150, 2015.
[4] “Duke microfluidics lab,” Available: http://microfluidics.ee.duke.edu/.
[5] F. Su, K. Chakrabarty, and R. B. Fair, “Microfluidics-based biochips: technology
issues, implementation platforms, and design-automation challenges,” Proceedings of
IEEE/ACM International Conference on Computer-Aided Design, vol. 25, pp. 211–
223, 2006.
[6] R. B. Fair, “Digital microfluidics: is a true lab-on-a-chip possible?,” Microfluidics and
Nanofluidics, vol. 3, pp. 245–281, 2007.
[7] R. Sista, Z. Hua, P. Thwar, A. Sudarsan, V. Srinivasan, A. Eckhardt, M. Pollack, and
V. Pamula, “Development of a digital microfluidic platform for point of care testing,”
Lab on a Chip, vol. 8, pp. 2091–2104, 2008.
[8] M. Pollack, A. Shenderov, and R. Fair, “Electrowetting-based actuation of droplets
for integrated microfluidics,” Lab on a Chip, vol. 2, pp. 96–101, 2002.
[9] T.-Y. Ho, K. Chakrabarty, and P. Pop, “Digital microfluidic biochips: recent research
and emerging challenges,” in Proceedings of IEEE/ACM International Conference on
Hardware/Software Codesign and System Synthesis, pp. 335–343, 2011.
[10] “Illumina neoprep library prep system,” Available:
http://www.illumina.com/systems/neopreplibrarysystem.html/.
[11] “Biochips market, type (dna chip (genomics, drug discovery, gene expression) labon-
a-chip (ivd & poc, proteomics), protein chips), end user (academics institutes,
diagnostics centers), fabrication technology (microarrays, microfluidics) - forecast
to 2020,” Available: http://www.marketsandmarkets.com/MarketReports/biochipsadvancedtechnologiesandglobalmarket54.
html/.
[12] S. S. Ali, M. Ibrahim, J. Rajendran, O. Sinanoglu, and K. Chakrabarty, “Supply-chain
security of digital microfluidic biochips,” IEEE Transactions on Computers, vol. 49,
pp. 36–43, 2016.
[13] R. Maes, P. Tuyls, and I. Verbauwhede, “A soft decision helper data algorithm for
sram pufs,” in Proceedings of IEEE International Symposium on Information Theory,
pp. 2101–2105, 2009.
[14] Y. Luo, K. Chakrabarty, and T.-Y. Ho, Hardware/Software Co-Design and Optimization
for Cyberphysical Integration in Digital Microfluidic Biochips. Springer, 2015.
[15] M. Ibrahim, Z. Li, and K. Chakrabarty, “Advances in design automation techniques
for digital-microfluidic biochips,” in Formal Modeling and Verification of Cyber-
Physical Systems, pp. 190–223, 2015.
[16] J. Song, R. Evans, Y.-Y. Lin, B.-N. Hsu, and R. Fair, “A scaling model for
electrowetting-on-dielectric microfluidic actuators,” Microfluidics and Nanofluidics,
vol. 7, pp. 75–89, 2009.
[17] J.-L. Zhang, G. Qu, Y.-Q. Lv, and Q. Zhou, “A survey on silicon pufs and recent
advances in ring oscillator pufs,” Proceedings of Journal of computer science and
technology, vol. 29, pp. 664–678, 2014.
[18] B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, “Silicon physical random functions,”
in Proceedings of ACM Conference on Computer and Communications Security,
pp. 148–160, 2002.
[19] R. Maes and I. Verbauwhede, “Physically unclonable functions: A study on the state
of the art and future research directions,” in Towards Hardware-Intrinsic Security,
pp. 3–37, Springer, 2010.
[20] R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, “Physical one-way functions,”
Science, vol. 297, no. 5589, pp. 2026–2030, 2002.
[21] P. Tuyls, G.-J. Schrijen, B. ˇSkori´c, J. Van Geloven, N. Verhaegh, and R. Wolters,
“Read-proof hardware from protective coatings,” in International Workshop on Cryptographic
Hardware and Embedded Systems, pp. 369–383, Springer, 2006.
[22] J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Fpga intrinsic pufs and their
use for ip protection,” in International workshop on Cryptographic Hardware and
Embedded Systems, pp. 63–80, Springer, 2007.
[23] Y. Luo, K. Chakrabarty, and T.-Y. Ho, “Real-time error recovery in cyberphysical
digital-microfluidic biochips using a compact dictionary,” IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems, vol. 32, pp. 1839–1852,
2013.
[24] Y. Alkabani, F. Koushanfar, and M. Potkonjak, “Remote activation of ics for piracy
prevention and digital right management,” in Proceedings of IEEE/ACM International
Conference on Computer-Aided Design, pp. 674–677, 2007.
[25] F. Koushanfar, “Provably secure active ic metering techniques for piracy avoidance
and digital rights management,” IEEE Transactions on Information Forensics and
Security, vol. 7, pp. 51–63, 2012.
[26] Y. Zhao, T. Xu, and K. Chakrabarty, “Integrated control-path design and error recovery
in the synthesis of digital microfluidic lab-on-chip,” ACM Journal on Emerging
Technologies in Computing Systems, vol. 6, p. 11, 2010.
[27] U. R¨uhrmair, F. Sehnke, J. S¨olter, G. Dror, S. Devadas, and J. Schmidhuber, “Modeling
attacks on physical unclonable functions,” in Proceedings of ACM Conference on
Computer and Communications Security, pp. 237–249, 2010.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *