<p><p>This book addresses the issue of Machine Learning (ML) attacks on Integrated Circuits through Physical Unclonable Functions (PUFs). It provides the mathematical proofs of the vulnerability of various PUF families, including Arbiter, XOR Arbiter, ring-oscillator, and bistable ring PUFs, to ML a
On the Physical Security of Physically Unclonable Functions
β Scribed by Shahin Tajik
- Publisher
- Springer International Publishing
- Year
- 2019
- Tongue
- English
- Leaves
- 91
- Series
- T-Labs Series in Telecommunication Services
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFsβ security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.
β¦ Table of Contents
Front Matter ....Pages i-xx
Introduction (Shahin Tajik)....Pages 1-6
Background (Shahin Tajik)....Pages 7-17
Experimental Setup (Shahin Tajik)....Pages 19-29
Photonic Side-Channel Analysis (Shahin Tajik)....Pages 31-43
Laser Fault Injection (Shahin Tajik)....Pages 45-53
Optical Contactless Probing (Shahin Tajik)....Pages 55-69
Conclusion and Future Work (Shahin Tajik)....Pages 71-73
Back Matter ....Pages 75-79
β¦ Subjects
Engineering; Circuits and Systems; Security Science and Technology; Control Structures and Microprogramming; Signal, Image and Speech Processing; Electronic Circuits and Devices
π SIMILAR VOLUMES
<span>This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientif
<span>This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientif
<span>The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising
<p><p>In <i>Physical Unclonable Functions in Theory and Practice</i>, the authors present an in-depth overview of various topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated mic