Abstract: | The various technologies presented herein relate to binding data (e.g.,
software) to hardware, wherein the hardware is to utilize the data. The
generated binding can be utilized to detect whether at least one of the
hardware or the data has been modified between an initial moment
(enrollment) and a later moment (authentication). During enrollment, an
enrollment value is generated that includes a signature of the data, a
first response from a PUF located on the hardware, and a code word.
During authentication, a second response from the PUF is utilized to
authenticate any of the content in the enrollment value, and based upon
the authentication, a determination can be made regarding whether the
hardware and/or the data have been modified. If modification is detected
then a mitigating operation can be performed, e.g., the hardware is
prevented from utilizing the data. If no modification is detected, the
data can be utilized. |