<span>This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientif
Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs (T-Labs Series in Telecommunication Services)
โ Scribed by Nils Wisiol
- Publisher
- Springer
- Tongue
- English
- Leaves
- 129
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.
๐ SIMILAR VOLUMES
<span>The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising
<span>This book presents the development of a gaming quality model to predict the gaming Quality of Experience (QoE) of players that could be used for planning the network service or quality monitoring of cloud gaming services. The author presents a model that is developed following a modular struct
<p>This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault in
<span>This book provides an understanding of the impact of delay on cloud gaming Quality of Experience (QoE) and proposes techniques to compensate for this impact, leading to a better gaming experience when there are network delays. The author studies why some games in the cloud are more delay sensi