On the physical security of physically unclonable functions. (2018)
- Record Type:
- Book
- Title:
- On the physical security of physically unclonable functions. (2018)
- Main Title:
- On the physical security of physically unclonable functions
- Further Information:
- Note: Shahin Tajik.
- Authors:
- Tajik, Shahin
- Contents:
- Intro; List of Publications; Contents; Abbreviations; List of Figures; List of Tables; Abstract; 1 Introduction; 1.1 Motivation and Background; 1.1.1 Reconfigurable Hardware; 1.1.2 Physical Attacks; 1.1.3 Physically Unclonable Function; 1.2 Problem Statement; 1.3 Scientific Contribution; 1.4 Thesis Structure; 2 Background; 2.1 Physically Unclonable Functions; 2.1.1 Arbiter PUF; 2.1.2 Ring-Oscillator PUF; 2.1.3 Are PUFs Tamper-Evident?; 2.2 Reconfigurable Hardware; 2.2.1 Security During Configuration; 2.2.2 PUF Implementations on FPGAs; 2.3 Semi-Invasive Attacks 2.3.1 Photonic Emission Analysis2.3.2 Laser Fault Injection; 2.3.3 Optical Contactless Probing; 2.4 Related Work; 3 Experimental Setup; 3.1 Devices Under Test; 3.1.1 Intel/Altera MAX V CPLD; 3.1.2 Intel/Altera Cyclone IV FPGA; 3.2 Hardware Implementations; 3.2.1 Standalone PUF Implementations; 3.2.2 Red Key Calculation; 3.2.3 PUF-Based Sensor; 3.3 Optical Setup; 3.3.1 Photonic Emission Analysis Setup; 3.3.2 Laser Fault Injection Setup; 3.3.3 Optical Contactless Probing Setup; 4 Photonic Side-Channel Analysis; 4.1 Attack Scenario; 4.1.1 Characterization of Multiplexer-Based Arbiter PUF 4.1.2 Characterization of Inverter-Based Arbiter PUF4.2 Results; 4.3 Discussion and Potential Countermeasures; 4.3.1 Feasibility of the Attack; 4.3.2 Photonic-Side Channel Attack Versus Modeling Attack; 4.3.3 Applicability of the Attack on Smaller Technologies; 4.3.4 Countermeasures; 5 Laser Fault Injection; 5.1 Attack Scenarios; 5.1.1Intro; List of Publications; Contents; Abbreviations; List of Figures; List of Tables; Abstract; 1 Introduction; 1.1 Motivation and Background; 1.1.1 Reconfigurable Hardware; 1.1.2 Physical Attacks; 1.1.3 Physically Unclonable Function; 1.2 Problem Statement; 1.3 Scientific Contribution; 1.4 Thesis Structure; 2 Background; 2.1 Physically Unclonable Functions; 2.1.1 Arbiter PUF; 2.1.2 Ring-Oscillator PUF; 2.1.3 Are PUFs Tamper-Evident?; 2.2 Reconfigurable Hardware; 2.2.1 Security During Configuration; 2.2.2 PUF Implementations on FPGAs; 2.3 Semi-Invasive Attacks 2.3.1 Photonic Emission Analysis2.3.2 Laser Fault Injection; 2.3.3 Optical Contactless Probing; 2.4 Related Work; 3 Experimental Setup; 3.1 Devices Under Test; 3.1.1 Intel/Altera MAX V CPLD; 3.1.2 Intel/Altera Cyclone IV FPGA; 3.2 Hardware Implementations; 3.2.1 Standalone PUF Implementations; 3.2.2 Red Key Calculation; 3.2.3 PUF-Based Sensor; 3.3 Optical Setup; 3.3.1 Photonic Emission Analysis Setup; 3.3.2 Laser Fault Injection Setup; 3.3.3 Optical Contactless Probing Setup; 4 Photonic Side-Channel Analysis; 4.1 Attack Scenario; 4.1.1 Characterization of Multiplexer-Based Arbiter PUF 4.1.2 Characterization of Inverter-Based Arbiter PUF4.2 Results; 4.3 Discussion and Potential Countermeasures; 4.3.1 Feasibility of the Attack; 4.3.2 Photonic-Side Channel Attack Versus Modeling Attack; 4.3.3 Applicability of the Attack on Smaller Technologies; 4.3.4 Countermeasures; 5 Laser Fault Injection; 5.1 Attack Scenarios; 5.1.1 LFI Attack Against XOR Arbiter PUFs; 5.1.2 LFI Attack Against RO PUFs; 5.2 Results; 5.3 Discussion and Potential Countermeasures; 5.3.1 Scalability of the Attack; 5.3.2 Applicability of the Attack; 5.3.3 Countermeasures; 6 Optical Contactless Probing 6.1 Attack Scenario6.1.1 Key Extraction; 6.1.2 RO PUF Characterization; 6.2 Results; 6.2.1 Key Extraction; 6.2.2 RO Characterization; 6.3 Discussion; 6.3.1 Locating the Registers and IP Cores on the Chip; 6.3.2 Feasibility and Scalability of the Attack; 6.3.3 Tamper Evidence; 6.4 Potential Countermeasure; 6.4.1 Requirements for PUFs as Sensors; 6.4.2 Sensor Candidates; 6.4.3 Combining RO Sum PUFs and RONs; 6.4.4 Enrollment and Verification; 6.4.5 Monitoring of Optical Probing Attempts; 6.4.6 Strengths and Weaknesses of PUFMon; 7 Conclusion and Future Work; References … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Engineering
Computer security
Adaptive computing systems
COMPUTERS / Security / General
Adaptive computing systems
Computer security
Technology & Engineering -- Engineering (General)
Computers -- Systems Architecture -- General
Technology & Engineering -- Electronics -- General
Technology & Engineering -- Electronics -- Circuits -- General
Security & fire alarm systems
Algorithms & data structures
Imaging systems & technology
Circuits & components
Systems engineering
Microprogramming
Electronic books - Languages:
- English
- ISBNs:
- 9783319758206
3319758209 - Related ISBNs:
- 9783319758190
3319758195 - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (SpringerLink, viewed April 3, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.367369
- Ingest File:
- 01_346.xml