Search papers, labs, and topics across Lattice.
This paper introduces a copy-protection method for industrial control software that binds execution to specific hardware using Physically Unclonable Functions (PUFs). Symbolic execution is employed to formally verify that safety properties are preserved even when the software is run on unintended hardware or when PUF responses are faulty. The approach also aims to provide security against reverse engineering attempts.
Guaranteeing safety properties of copy-protected industrial software, even when executed on unintended hardware, becomes possible with a novel PUF-based binding and symbolic execution verification.
We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.