Side-Channel Hybrid Attacks on Strong Physical Unclonable Function

被引:0
作者
Liu W. [1 ]
Jiang L.-H. [1 ]
Chang R. [1 ]
机构
[1] Institute of Cyberspace Security, Information Engineering University of Strategic Support Force, Zhengzhou, 450002, Henan
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2019年 / 47卷 / 12期
关键词
Fault injection; Machine learning; Power analysis; Reliability; Side-channel hybrid attack; Strong PUF;
D O I
10.3969/j.issn.0372-2112.2019.12.025
中图分类号
学科分类号
摘要
Due to the tamperproof and lightweight nature, physical unclonable function are proposed to provide security with low cost for the internet of things.Security of PUF itself has attracted much more attention.Almost all strong PUF can be modeled using machine learning techniques, while the complicated PUF with non-linear structure, which are resistant to machine learning modeling, are vulnerable to side channel attacks.According to the unified symbol rules, the paper presents existing side channel attack methods on strong PUFs, such as reliability analysis, power analysis and fault injection.The principles, performance and applications of side channel/machine learning hybrid attack methods are elaborated and analyzed.In the end, the temporary predicaments and countermeasures of side channel attack on PUF are discussed. © 2019, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:2639 / 2646
页数:7
相关论文
共 41 条
[1]  
Gassend B., Clarke D., Dijk M.V., Et al., Silicon physical random functions, Proceedings of 9th ACM Conf Computer and Communication Security, pp. 148-160, (2002)
[2]  
Herder C., Yu M.D., Koushanfar F., Et al., Physical unclonable functions and applications: a tutorial, Proceedings of the IEEE, 102, 8, pp. 1126-1141, (2014)
[3]  
Zhang J., Qu G., Lyu Y., Zhou Q., A survey on silicon PUFs and recent advances in ring oscillator PUFs, Journal of Computer Science and Technology (JCST), 29, 4, pp. 664-678, (2014)
[4]  
Rose G.S., Meade C.A., Performance analysis of a memristive crossbar PUF design, Proceedings of the 52nd Annual Design Automation Conference, pp. 1-6, (2015)
[5]  
Majzoobi M., Koushanfar F., Potkonjak M., Lightweight secure PUFs, IEEE/ACM International Conference on Computer-Aided Design, pp. 670-673, (2008)
[6]  
Sahoo D.P., Saha S., Mukhopadhyay D., Et al., Composite PUF: A new design paradigm forphysically unclonable functions on FPGA, IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 50-55, (2014)
[7]  
Nguyen P.H., Sahoo D.P., Lightweight andsecure PUFs: a survey, International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 1-13, (2014)
[8]  
Sahoo D.P., Nguyen P.H., Mukhopadhyay D., Et al., Acase of lightweight PUF constructions: cryptanalysis and machine learning attacks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34, 8, pp. 1334-1343, (2015)
[9]  
Xu X., Burleson W., Hybrid side-channel/machine-learning attacks on PUFs: a new threat?, Proceedings of Design, Automation and Test in Europe Conference and Exhibition, pp. 349-354, (2014)
[10]  
Liu Y., Xie Y., Bao C., Et al., Acombined optimization-theoretic and side-channel approach for attacking strong physical unclonable functions, IEEE Transactions on Very Large Scale Integration Systems, 26, 1, pp. 73-81, (2017)