Computer Security by Hardware-Intrinsic Authentication

The Internet of Things (IoT) has brought evident security concerns. To keep up with the need of low cost devices, IoT security will need to reduce the dependency on non-volatile memory for key storage, promote easier means to uniquely identify billions of devices, and integrate different hardware and software solutions. Physical Unclonable Functions (PUFs) have been adopted as the future for key derivation and hardware fingerprint. This work presents CSHIA: a new computer architecture that takes into account limitations and strengths of PUFs to provide code and data integrity and authenticity in a seam- less design that does not demand changes in processors microarchitecture or software. We describe and analyse a full-fledged FPGA deployment of the archi- tecture and consider attack scenarios, including side-channel attacks on PUFs.