PUFBind: PUF-Enabled Lightweight Program Binary Authentication for FPGA-based Embedded Systems Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2501.07868
Field Programmable Gate Array (FPGA)-based embedded systems have become mainstream in the last decade, often in security-sensitive applications. However, even with an authenticated hardware platform, compromised software can severely jeopardize the overall system security, making hardware protection insufficient if the software itself is malicious. In this paper, we propose a novel low-overhead hardware-software co-design solution that utilizes Physical Unclonable Functions (PUFs) to ensure the authenticity of program binaries for microprocessors/microcontrollers mapped on the FPGA. Our technique binds a program binary to a specific target FPGA through a PUF signature, performs runtime authentication for the program binary, and allows execution of the binary only after successful authentication. The proposed scheme is platform-agnostic and capable of operating in a "bare metal'' mode (no system software requirement) for maximum flexibility. Our scheme also does not require any modification of the original hardware design or program binary. We demonstrate a successful prototype implementation using the open-source PicoBlaze microcontroller on AMD/Xilinx FPGA, comparing its hardware resource footprint and performance with other existing solutions of a similar nature.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2501.07868
- https://arxiv.org/pdf/2501.07868
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4406449441
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4406449441Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2501.07868Digital Object Identifier
- Title
-
PUFBind: PUF-Enabled Lightweight Program Binary Authentication for FPGA-based Embedded SystemsWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-14Full publication date if available
- Authors
-
Sneha Swaroopa, Venkata Sreekanth Balijabudda, Rajat Subhra Chakraborty, Indrajit ChakrabartiList of authors in order
- Landing page
-
https://arxiv.org/abs/2501.07868Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2501.07868Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2501.07868Direct OA link when available
- Concepts
-
Field-programmable gate array, Embedded system, Computer science, Authentication (law), Operating system, Computer architecture, Computer hardware, Computer securityTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4406449441 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2501.07868 |
| ids.doi | https://doi.org/10.48550/arxiv.2501.07868 |
| ids.openalex | https://openalex.org/W4406449441 |
| fwci | |
| type | preprint |
| title | PUFBind: PUF-Enabled Lightweight Program Binary Authentication for FPGA-based Embedded Systems |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T12122 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1708 |
| topics[0].subfield.display_name | Hardware and Architecture |
| topics[0].display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.987500011920929 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T11424 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9753000140190125 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Security and Verification in Computing |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C42935608 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8311994075775146 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q190411 |
| concepts[0].display_name | Field-programmable gate array |
| concepts[1].id | https://openalex.org/C149635348 |
| concepts[1].level | 1 |
| concepts[1].score | 0.7073462605476379 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[1].display_name | Embedded system |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.6784486770629883 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C148417208 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6383014917373657 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[3].display_name | Authentication (law) |
| concepts[4].id | https://openalex.org/C111919701 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4348222017288208 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[4].display_name | Operating system |
| concepts[5].id | https://openalex.org/C118524514 |
| concepts[5].level | 1 |
| concepts[5].score | 0.40213966369628906 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q173212 |
| concepts[5].display_name | Computer architecture |
| concepts[6].id | https://openalex.org/C9390403 |
| concepts[6].level | 1 |
| concepts[6].score | 0.33970698714256287 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3966 |
| concepts[6].display_name | Computer hardware |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.19216910004615784 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| keywords[0].id | https://openalex.org/keywords/field-programmable-gate-array |
| keywords[0].score | 0.8311994075775146 |
| keywords[0].display_name | Field-programmable gate array |
| keywords[1].id | https://openalex.org/keywords/embedded-system |
| keywords[1].score | 0.7073462605476379 |
| keywords[1].display_name | Embedded system |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.6784486770629883 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/authentication |
| keywords[3].score | 0.6383014917373657 |
| keywords[3].display_name | Authentication (law) |
| keywords[4].id | https://openalex.org/keywords/operating-system |
| keywords[4].score | 0.4348222017288208 |
| keywords[4].display_name | Operating system |
| keywords[5].id | https://openalex.org/keywords/computer-architecture |
| keywords[5].score | 0.40213966369628906 |
| keywords[5].display_name | Computer architecture |
| keywords[6].id | https://openalex.org/keywords/computer-hardware |
| keywords[6].score | 0.33970698714256287 |
| keywords[6].display_name | Computer hardware |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.19216910004615784 |
| keywords[7].display_name | Computer security |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2501.07868 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2501.07868 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2501.07868 |
| locations[1].id | doi:10.48550/arxiv.2501.07868 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2501.07868 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5107733495 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Sneha Swaroopa |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Swaroopa, Sneha |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5055779873 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Venkata Sreekanth Balijabudda |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Balijabudda, Venkata Sreekanth |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5049426113 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-3588-163X |
| authorships[2].author.display_name | Rajat Subhra Chakraborty |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Chakraborty, Rajat Subhra |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5003667123 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-4744-2132 |
| authorships[3].author.display_name | Indrajit Chakrabarti |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Chakrabarti, Indrajit |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2501.07868 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | PUFBind: PUF-Enabled Lightweight Program Binary Authentication for FPGA-based Embedded Systems |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T12122 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1708 |
| primary_topic.subfield.display_name | Hardware and Architecture |
| primary_topic.display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| related_works | https://openalex.org/W2111241003, https://openalex.org/W2355315220, https://openalex.org/W4200391368, https://openalex.org/W2210979487, https://openalex.org/W2316202402, https://openalex.org/W2074043759, https://openalex.org/W2082487009, https://openalex.org/W1967938402, https://openalex.org/W2386041993, https://openalex.org/W1608572506 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2501.07868 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2501.07868 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2501.07868 |
| primary_location.id | pmh:oai:arXiv.org:2501.07868 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2501.07868 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2501.07868 |
| publication_date | 2025-01-14 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 49, 77, 81, 86, 116, 145, 169 |
| abstract_inverted_index.In | 44 |
| abstract_inverted_index.We | 143 |
| abstract_inverted_index.an | 21 |
| abstract_inverted_index.if | 38 |
| abstract_inverted_index.in | 10, 15, 115 |
| abstract_inverted_index.is | 42, 109 |
| abstract_inverted_index.of | 65, 99, 113, 135, 168 |
| abstract_inverted_index.on | 71, 154 |
| abstract_inverted_index.or | 140 |
| abstract_inverted_index.to | 61, 80 |
| abstract_inverted_index.we | 47 |
| abstract_inverted_index.(no | 120 |
| abstract_inverted_index.Our | 74, 127 |
| abstract_inverted_index.PUF | 87 |
| abstract_inverted_index.The | 106 |
| abstract_inverted_index.and | 96, 111, 162 |
| abstract_inverted_index.any | 133 |
| abstract_inverted_index.can | 27 |
| abstract_inverted_index.for | 68, 92, 124 |
| abstract_inverted_index.its | 158 |
| abstract_inverted_index.not | 131 |
| abstract_inverted_index.the | 11, 30, 39, 63, 72, 93, 100, 136, 150 |
| abstract_inverted_index.FPGA | 84 |
| abstract_inverted_index.Gate | 2 |
| abstract_inverted_index.also | 129 |
| abstract_inverted_index.does | 130 |
| abstract_inverted_index.even | 19 |
| abstract_inverted_index.have | 7 |
| abstract_inverted_index.last | 12 |
| abstract_inverted_index.mode | 119 |
| abstract_inverted_index.only | 102 |
| abstract_inverted_index.that | 55 |
| abstract_inverted_index.this | 45 |
| abstract_inverted_index.with | 20, 164 |
| abstract_inverted_index."bare | 117 |
| abstract_inverted_index.Array | 3 |
| abstract_inverted_index.FPGA, | 156 |
| abstract_inverted_index.FPGA. | 73 |
| abstract_inverted_index.Field | 0 |
| abstract_inverted_index.after | 103 |
| abstract_inverted_index.binds | 76 |
| abstract_inverted_index.novel | 50 |
| abstract_inverted_index.often | 14 |
| abstract_inverted_index.other | 165 |
| abstract_inverted_index.using | 149 |
| abstract_inverted_index.(PUFs) | 60 |
| abstract_inverted_index.allows | 97 |
| abstract_inverted_index.become | 8 |
| abstract_inverted_index.binary | 79, 101 |
| abstract_inverted_index.design | 139 |
| abstract_inverted_index.ensure | 62 |
| abstract_inverted_index.itself | 41 |
| abstract_inverted_index.making | 34 |
| abstract_inverted_index.mapped | 70 |
| abstract_inverted_index.paper, | 46 |
| abstract_inverted_index.scheme | 108, 128 |
| abstract_inverted_index.system | 32, 121 |
| abstract_inverted_index.target | 83 |
| abstract_inverted_index.binary, | 95 |
| abstract_inverted_index.binary. | 142 |
| abstract_inverted_index.capable | 112 |
| abstract_inverted_index.decade, | 13 |
| abstract_inverted_index.maximum | 125 |
| abstract_inverted_index.metal'' | 118 |
| abstract_inverted_index.nature. | 171 |
| abstract_inverted_index.overall | 31 |
| abstract_inverted_index.program | 66, 78, 94, 141 |
| abstract_inverted_index.propose | 48 |
| abstract_inverted_index.require | 132 |
| abstract_inverted_index.runtime | 90 |
| abstract_inverted_index.similar | 170 |
| abstract_inverted_index.systems | 6 |
| abstract_inverted_index.through | 85 |
| abstract_inverted_index.However, | 18 |
| abstract_inverted_index.Physical | 57 |
| abstract_inverted_index.binaries | 67 |
| abstract_inverted_index.embedded | 5 |
| abstract_inverted_index.existing | 166 |
| abstract_inverted_index.hardware | 23, 35, 138, 159 |
| abstract_inverted_index.original | 137 |
| abstract_inverted_index.performs | 89 |
| abstract_inverted_index.proposed | 107 |
| abstract_inverted_index.resource | 160 |
| abstract_inverted_index.severely | 28 |
| abstract_inverted_index.software | 26, 40, 122 |
| abstract_inverted_index.solution | 54 |
| abstract_inverted_index.specific | 82 |
| abstract_inverted_index.utilizes | 56 |
| abstract_inverted_index.Functions | 59 |
| abstract_inverted_index.PicoBlaze | 152 |
| abstract_inverted_index.co-design | 53 |
| abstract_inverted_index.comparing | 157 |
| abstract_inverted_index.execution | 98 |
| abstract_inverted_index.footprint | 161 |
| abstract_inverted_index.operating | 114 |
| abstract_inverted_index.platform, | 24 |
| abstract_inverted_index.prototype | 147 |
| abstract_inverted_index.security, | 33 |
| abstract_inverted_index.solutions | 167 |
| abstract_inverted_index.technique | 75 |
| abstract_inverted_index.AMD/Xilinx | 155 |
| abstract_inverted_index.Unclonable | 58 |
| abstract_inverted_index.jeopardize | 29 |
| abstract_inverted_index.mainstream | 9 |
| abstract_inverted_index.malicious. | 43 |
| abstract_inverted_index.protection | 36 |
| abstract_inverted_index.signature, | 88 |
| abstract_inverted_index.successful | 104, 146 |
| abstract_inverted_index.compromised | 25 |
| abstract_inverted_index.demonstrate | 144 |
| abstract_inverted_index.open-source | 151 |
| abstract_inverted_index.performance | 163 |
| abstract_inverted_index.(FPGA)-based | 4 |
| abstract_inverted_index.Programmable | 1 |
| abstract_inverted_index.authenticity | 64 |
| abstract_inverted_index.flexibility. | 126 |
| abstract_inverted_index.insufficient | 37 |
| abstract_inverted_index.low-overhead | 51 |
| abstract_inverted_index.modification | 134 |
| abstract_inverted_index.requirement) | 123 |
| abstract_inverted_index.applications. | 17 |
| abstract_inverted_index.authenticated | 22 |
| abstract_inverted_index.authentication | 91 |
| abstract_inverted_index.implementation | 148 |
| abstract_inverted_index.authentication. | 105 |
| abstract_inverted_index.microcontroller | 153 |
| abstract_inverted_index.hardware-software | 52 |
| abstract_inverted_index.platform-agnostic | 110 |
| abstract_inverted_index.security-sensitive | 16 |
| abstract_inverted_index.microprocessors/microcontrollers | 69 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |