研究生: |
謝慶威 Hsieh, Ching-Wei |
---|---|
論文名稱: |
防止數位微流體生物晶片之侵權行為 Piracy Prevention of Digital Microfluidic Biochips |
指導教授: |
何宗易
Ho, Tsung-Yi |
口試委員: |
黃俊達
Huang, Juinn-Dar 李淑敏 Li, Shu-Min |
學位類別: |
碩士 Master |
系所名稱: |
|
論文出版年: | 2017 |
畢業學年度: | 105 |
語文別: | 英文 |
論文頁數: | 36 |
中文關鍵詞: | 侵權 、數位微流體生物晶片 |
外文關鍵詞: | Piracy, DMFB |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
數位微流體生物晶片因為低消耗、便利攜帶性和高效率的關係,在現今的健康照護產業中扮演著重要角色。根據最新的市場調查報告,生物晶片的市值成長率是往年的兩倍以上。然而隨著市值的巨大成長,利用侵權行為來獲取不法所得也成了一大威脅。為了防止侵權行為,傳統方法上是利用密鑰來授權。然而,數位微流體生物晶片上並沒有複雜的記憶體和邏輯閘來儲存密鑰,因此設計防護方法變得更加困難。在這篇論文中,我們提出了第一個利用最新物理不可克隆函數(PUF)來授權數位微流體生物晶片的防護方法。我們提出的物理不可克隆函數(PUF)利用了數位微流體生物晶片上固有的變異來生產密鑰,因此不需要使用記憶體。最後,我們分析了提出的方法的安全性,實驗也顯示出此方法的可行性。
Digital microfluidic biochips (DMFBs) play an important role in the healthcare industry due to its advantages such as low-cost, portability, and efficiency. According to the recent market report, the growth of biochips market is twice than before. However, as the
enormous business opportunities grow, piracy attacks, which are exploited by unscrupulous people to gain illegal profits, become a severe threat to DMFBs. To prevent piracy attacks, the conventional approach uses secret keys to perform authentication. Nevertheless,
DMFBs only consist of electrodes to control the operations of droplets, and there are no memories and logic gates integrated on it to store secret keys. This makes designing secure defenses of DMFBs against piracy attacks more dicult. Thus, in this thesis, we propose the first authentication method for piracy prevention of DMFBs based on a novel Physical Unclonable Function (PUF). The proposed PUF utilizes the inherent variation of electrodes on DMFBs to generate secret keys, so it does not require memory. Experimental
results demonstrate the feasibility of our proposed PUF. Finally, we analyze the security of the proposed method against piracy attacks.
[1] S. S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty, and R. Karri, “Security assessment
of cyberphysical digital microfluidic biochips,” IEEE/ACM Transactions on
Computational Biology and Bioinformatics, vol. 13, pp. 445–458, 2016.
[2] G. E. Suh and S. Devadas, “Physical unclonable functions for device authentication
and secret key generation,” in Proceedings of ACM/IEEE Design Automation Conference,
pp. 9–14, 2007.
[3] J. Zhang, Y. Lin, Y. Lyu, and G. Qu, “A puf-fsm binding scheme for fpga ip protection
and pay-per-device licensing,” IEEE Transactions on Information Forensics and
Security, vol. 10, pp. 1137–1150, 2015.
[4] “Duke microfluidics lab,” Available: http://microfluidics.ee.duke.edu/.
[5] F. Su, K. Chakrabarty, and R. B. Fair, “Microfluidics-based biochips: technology
issues, implementation platforms, and design-automation challenges,” Proceedings of
IEEE/ACM International Conference on Computer-Aided Design, vol. 25, pp. 211–
223, 2006.
[6] R. B. Fair, “Digital microfluidics: is a true lab-on-a-chip possible?,” Microfluidics and
Nanofluidics, vol. 3, pp. 245–281, 2007.
[7] R. Sista, Z. Hua, P. Thwar, A. Sudarsan, V. Srinivasan, A. Eckhardt, M. Pollack, and
V. Pamula, “Development of a digital microfluidic platform for point of care testing,”
Lab on a Chip, vol. 8, pp. 2091–2104, 2008.
[8] M. Pollack, A. Shenderov, and R. Fair, “Electrowetting-based actuation of droplets
for integrated microfluidics,” Lab on a Chip, vol. 2, pp. 96–101, 2002.
[9] T.-Y. Ho, K. Chakrabarty, and P. Pop, “Digital microfluidic biochips: recent research
and emerging challenges,” in Proceedings of IEEE/ACM International Conference on
Hardware/Software Codesign and System Synthesis, pp. 335–343, 2011.
[10] “Illumina neoprep library prep system,” Available:
http://www.illumina.com/systems/neopreplibrarysystem.html/.
[11] “Biochips market, type (dna chip (genomics, drug discovery, gene expression) labon-
a-chip (ivd & poc, proteomics), protein chips), end user (academics institutes,
diagnostics centers), fabrication technology (microarrays, microfluidics) - forecast
to 2020,” Available: http://www.marketsandmarkets.com/MarketReports/biochipsadvancedtechnologiesandglobalmarket54.
html/.
[12] S. S. Ali, M. Ibrahim, J. Rajendran, O. Sinanoglu, and K. Chakrabarty, “Supply-chain
security of digital microfluidic biochips,” IEEE Transactions on Computers, vol. 49,
pp. 36–43, 2016.
[13] R. Maes, P. Tuyls, and I. Verbauwhede, “A soft decision helper data algorithm for
sram pufs,” in Proceedings of IEEE International Symposium on Information Theory,
pp. 2101–2105, 2009.
[14] Y. Luo, K. Chakrabarty, and T.-Y. Ho, Hardware/Software Co-Design and Optimization
for Cyberphysical Integration in Digital Microfluidic Biochips. Springer, 2015.
[15] M. Ibrahim, Z. Li, and K. Chakrabarty, “Advances in design automation techniques
for digital-microfluidic biochips,” in Formal Modeling and Verification of Cyber-
Physical Systems, pp. 190–223, 2015.
[16] J. Song, R. Evans, Y.-Y. Lin, B.-N. Hsu, and R. Fair, “A scaling model for
electrowetting-on-dielectric microfluidic actuators,” Microfluidics and Nanofluidics,
vol. 7, pp. 75–89, 2009.
[17] J.-L. Zhang, G. Qu, Y.-Q. Lv, and Q. Zhou, “A survey on silicon pufs and recent
advances in ring oscillator pufs,” Proceedings of Journal of computer science and
technology, vol. 29, pp. 664–678, 2014.
[18] B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, “Silicon physical random functions,”
in Proceedings of ACM Conference on Computer and Communications Security,
pp. 148–160, 2002.
[19] R. Maes and I. Verbauwhede, “Physically unclonable functions: A study on the state
of the art and future research directions,” in Towards Hardware-Intrinsic Security,
pp. 3–37, Springer, 2010.
[20] R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, “Physical one-way functions,”
Science, vol. 297, no. 5589, pp. 2026–2030, 2002.
[21] P. Tuyls, G.-J. Schrijen, B. ˇSkori´c, J. Van Geloven, N. Verhaegh, and R. Wolters,
“Read-proof hardware from protective coatings,” in International Workshop on Cryptographic
Hardware and Embedded Systems, pp. 369–383, Springer, 2006.
[22] J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Fpga intrinsic pufs and their
use for ip protection,” in International workshop on Cryptographic Hardware and
Embedded Systems, pp. 63–80, Springer, 2007.
[23] Y. Luo, K. Chakrabarty, and T.-Y. Ho, “Real-time error recovery in cyberphysical
digital-microfluidic biochips using a compact dictionary,” IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems, vol. 32, pp. 1839–1852,
2013.
[24] Y. Alkabani, F. Koushanfar, and M. Potkonjak, “Remote activation of ics for piracy
prevention and digital right management,” in Proceedings of IEEE/ACM International
Conference on Computer-Aided Design, pp. 674–677, 2007.
[25] F. Koushanfar, “Provably secure active ic metering techniques for piracy avoidance
and digital rights management,” IEEE Transactions on Information Forensics and
Security, vol. 7, pp. 51–63, 2012.
[26] Y. Zhao, T. Xu, and K. Chakrabarty, “Integrated control-path design and error recovery
in the synthesis of digital microfluidic lab-on-chip,” ACM Journal on Emerging
Technologies in Computing Systems, vol. 6, p. 11, 2010.
[27] U. R¨uhrmair, F. Sehnke, J. S¨olter, G. Dror, S. Devadas, and J. Schmidhuber, “Modeling
attacks on physical unclonable functions,” in Proceedings of ACM Conference on
Computer and Communications Security, pp. 237–249, 2010.