簡易檢索 / 詳目顯示

研究生: 謝慶威
Hsieh, Ching-Wei
論文名稱: 防止數位微流體生物晶片之侵權行為
Piracy Prevention of Digital Microfluidic Biochips
指導教授: 何宗易
Ho, Tsung-Yi
口試委員: 黃俊達
Huang, Juinn-Dar
李淑敏
Li, Shu-Min
學位類別: 碩士
Master
系所名稱:
論文出版年: 2017
畢業學年度: 105
語文別: 英文
論文頁數: 36
中文關鍵詞: 侵權數位微流體生物晶片
外文關鍵詞: Piracy, DMFB
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 數位微流體生物晶片因為低消耗、便利攜帶性和高效率的關係,在現今的健康照護產業中扮演著重要角色。根據最新的市場調查報告,生物晶片的市值成長率是往年的兩倍以上。然而隨著市值的巨大成長,利用侵權行為來獲取不法所得也成了一大威脅。為了防止侵權行為,傳統方法上是利用密鑰來授權。然而,數位微流體生物晶片上並沒有複雜的記憶體和邏輯閘來儲存密鑰,因此設計防護方法變得更加困難。在這篇論文中,我們提出了第一個利用最新物理不可克隆函數(PUF)來授權數位微流體生物晶片的防護方法。我們提出的物理不可克隆函數(PUF)利用了數位微流體生物晶片上固有的變異來生產密鑰,因此不需要使用記憶體。最後,我們分析了提出的方法的安全性,實驗也顯示出此方法的可行性。


    Digital microfluidic biochips (DMFBs) play an important role in the healthcare industry due to its advantages such as low-cost, portability, and efficiency. According to the recent market report, the growth of biochips market is twice than before. However, as the
    enormous business opportunities grow, piracy attacks, which are exploited by unscrupulous people to gain illegal profits, become a severe threat to DMFBs. To prevent piracy attacks, the conventional approach uses secret keys to perform authentication. Nevertheless,
    DMFBs only consist of electrodes to control the operations of droplets, and there are no memories and logic gates integrated on it to store secret keys. This makes designing secure defenses of DMFBs against piracy attacks more dicult. Thus, in this thesis, we propose the first authentication method for piracy prevention of DMFBs based on a novel Physical Unclonable Function (PUF). The proposed PUF utilizes the inherent variation of electrodes on DMFBs to generate secret keys, so it does not require memory. Experimental
    results demonstrate the feasibility of our proposed PUF. Finally, we analyze the security of the proposed method against piracy attacks.

    Acknowledgement i Abstract ii 1 Introduction 1 1.1 Digital Microfluidic Biochip . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Motivations for attacking DMFBs . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Security Vulnerabilities of DMFBs . . . . . . . . . . . . . . . . . . . . . . 2 1.4 Digital Right Management . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.5 Physical Unclonable Function . . . . . . . . . . . . . . . . . . . . . . . . 4 1.6 Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Background 6 2.1 Digital Microfluidic Biochip (DMFB) . . . . . . . . . . . . . . . . . . . . 6 2.1.1 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.2 Design Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2 Piracy Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2.1 Piracys impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.3 Physical Unclonable Function (PUF) . . . . . . . . . . . . . . . . . . . . . 12 iii 2.3.1 PUF classification . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3 DRM model for DMFBs 15 3.1 Design Flow of DMFBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.2 Principle of the DRM Process . . . . . . . . . . . . . . . . . . . . . . . . 17 3.3 Lock/Unlock DMFBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.3.1 Lock method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.3.2 Unlock method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 4 Developed PUFs for DMFBs 23 4.1 Route PUF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 4.2 Split PUF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 4.3 Experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 5 The Security Analysis 30 5.1 Brute force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 5.2 Simulating PUF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 5.3 Reverse engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 5.4 Counterfeiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 6 Conclusion 32 References 33

    [1] S. S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty, and R. Karri, “Security assessment
    of cyberphysical digital microfluidic biochips,” IEEE/ACM Transactions on
    Computational Biology and Bioinformatics, vol. 13, pp. 445–458, 2016.
    [2] G. E. Suh and S. Devadas, “Physical unclonable functions for device authentication
    and secret key generation,” in Proceedings of ACM/IEEE Design Automation Conference,
    pp. 9–14, 2007.
    [3] J. Zhang, Y. Lin, Y. Lyu, and G. Qu, “A puf-fsm binding scheme for fpga ip protection
    and pay-per-device licensing,” IEEE Transactions on Information Forensics and
    Security, vol. 10, pp. 1137–1150, 2015.
    [4] “Duke microfluidics lab,” Available: http://microfluidics.ee.duke.edu/.
    [5] F. Su, K. Chakrabarty, and R. B. Fair, “Microfluidics-based biochips: technology
    issues, implementation platforms, and design-automation challenges,” Proceedings of
    IEEE/ACM International Conference on Computer-Aided Design, vol. 25, pp. 211–
    223, 2006.
    [6] R. B. Fair, “Digital microfluidics: is a true lab-on-a-chip possible?,” Microfluidics and
    Nanofluidics, vol. 3, pp. 245–281, 2007.
    [7] R. Sista, Z. Hua, P. Thwar, A. Sudarsan, V. Srinivasan, A. Eckhardt, M. Pollack, and
    V. Pamula, “Development of a digital microfluidic platform for point of care testing,”
    Lab on a Chip, vol. 8, pp. 2091–2104, 2008.
    [8] M. Pollack, A. Shenderov, and R. Fair, “Electrowetting-based actuation of droplets
    for integrated microfluidics,” Lab on a Chip, vol. 2, pp. 96–101, 2002.
    [9] T.-Y. Ho, K. Chakrabarty, and P. Pop, “Digital microfluidic biochips: recent research
    and emerging challenges,” in Proceedings of IEEE/ACM International Conference on
    Hardware/Software Codesign and System Synthesis, pp. 335–343, 2011.
    [10] “Illumina neoprep library prep system,” Available:
    http://www.illumina.com/systems/neopreplibrarysystem.html/.
    [11] “Biochips market, type (dna chip (genomics, drug discovery, gene expression) labon-
    a-chip (ivd & poc, proteomics), protein chips), end user (academics institutes,
    diagnostics centers), fabrication technology (microarrays, microfluidics) - forecast
    to 2020,” Available: http://www.marketsandmarkets.com/MarketReports/biochipsadvancedtechnologiesandglobalmarket54.
    html/.
    [12] S. S. Ali, M. Ibrahim, J. Rajendran, O. Sinanoglu, and K. Chakrabarty, “Supply-chain
    security of digital microfluidic biochips,” IEEE Transactions on Computers, vol. 49,
    pp. 36–43, 2016.
    [13] R. Maes, P. Tuyls, and I. Verbauwhede, “A soft decision helper data algorithm for
    sram pufs,” in Proceedings of IEEE International Symposium on Information Theory,
    pp. 2101–2105, 2009.
    [14] Y. Luo, K. Chakrabarty, and T.-Y. Ho, Hardware/Software Co-Design and Optimization
    for Cyberphysical Integration in Digital Microfluidic Biochips. Springer, 2015.
    [15] M. Ibrahim, Z. Li, and K. Chakrabarty, “Advances in design automation techniques
    for digital-microfluidic biochips,” in Formal Modeling and Verification of Cyber-
    Physical Systems, pp. 190–223, 2015.
    [16] J. Song, R. Evans, Y.-Y. Lin, B.-N. Hsu, and R. Fair, “A scaling model for
    electrowetting-on-dielectric microfluidic actuators,” Microfluidics and Nanofluidics,
    vol. 7, pp. 75–89, 2009.
    [17] J.-L. Zhang, G. Qu, Y.-Q. Lv, and Q. Zhou, “A survey on silicon pufs and recent
    advances in ring oscillator pufs,” Proceedings of Journal of computer science and
    technology, vol. 29, pp. 664–678, 2014.
    [18] B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, “Silicon physical random functions,”
    in Proceedings of ACM Conference on Computer and Communications Security,
    pp. 148–160, 2002.
    [19] R. Maes and I. Verbauwhede, “Physically unclonable functions: A study on the state
    of the art and future research directions,” in Towards Hardware-Intrinsic Security,
    pp. 3–37, Springer, 2010.
    [20] R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, “Physical one-way functions,”
    Science, vol. 297, no. 5589, pp. 2026–2030, 2002.
    [21] P. Tuyls, G.-J. Schrijen, B. ˇSkori´c, J. Van Geloven, N. Verhaegh, and R. Wolters,
    “Read-proof hardware from protective coatings,” in International Workshop on Cryptographic
    Hardware and Embedded Systems, pp. 369–383, Springer, 2006.
    [22] J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “Fpga intrinsic pufs and their
    use for ip protection,” in International workshop on Cryptographic Hardware and
    Embedded Systems, pp. 63–80, Springer, 2007.
    [23] Y. Luo, K. Chakrabarty, and T.-Y. Ho, “Real-time error recovery in cyberphysical
    digital-microfluidic biochips using a compact dictionary,” IEEE Transactions on
    Computer-Aided Design of Integrated Circuits and Systems, vol. 32, pp. 1839–1852,
    2013.
    [24] Y. Alkabani, F. Koushanfar, and M. Potkonjak, “Remote activation of ics for piracy
    prevention and digital right management,” in Proceedings of IEEE/ACM International
    Conference on Computer-Aided Design, pp. 674–677, 2007.
    [25] F. Koushanfar, “Provably secure active ic metering techniques for piracy avoidance
    and digital rights management,” IEEE Transactions on Information Forensics and
    Security, vol. 7, pp. 51–63, 2012.
    [26] Y. Zhao, T. Xu, and K. Chakrabarty, “Integrated control-path design and error recovery
    in the synthesis of digital microfluidic lab-on-chip,” ACM Journal on Emerging
    Technologies in Computing Systems, vol. 6, p. 11, 2010.
    [27] U. R¨uhrmair, F. Sehnke, J. S¨olter, G. Dror, S. Devadas, and J. Schmidhuber, “Modeling
    attacks on physical unclonable functions,” in Proceedings of ACM Conference on
    Computer and Communications Security, pp. 237–249, 2010.

    QR CODE