Side-Channel Hybrid Attacks on Strong Physical Unclonable Function

被引:0
作者
Liu W. [1 ]
Jiang L.-H. [1 ]
Chang R. [1 ]
机构
[1] Institute of Cyberspace Security, Information Engineering University of Strategic Support Force, Zhengzhou, 450002, Henan
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2019年 / 47卷 / 12期
关键词
Fault injection; Machine learning; Power analysis; Reliability; Side-channel hybrid attack; Strong PUF;
D O I
10.3969/j.issn.0372-2112.2019.12.025
中图分类号
学科分类号
摘要
Due to the tamperproof and lightweight nature, physical unclonable function are proposed to provide security with low cost for the internet of things.Security of PUF itself has attracted much more attention.Almost all strong PUF can be modeled using machine learning techniques, while the complicated PUF with non-linear structure, which are resistant to machine learning modeling, are vulnerable to side channel attacks.According to the unified symbol rules, the paper presents existing side channel attack methods on strong PUFs, such as reliability analysis, power analysis and fault injection.The principles, performance and applications of side channel/machine learning hybrid attack methods are elaborated and analyzed.In the end, the temporary predicaments and countermeasures of side channel attack on PUF are discussed. © 2019, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:2639 / 2646
页数:7
相关论文
共 41 条
[11]  
Ruhrmair U., Solter J., Sehnke F., Et al., PUFmodeling attacks on simulated and silicon data, IEEE Transactions on Information Forensics & Security, 8, 11, pp. 1876-1891, (2013)
[12]  
Tobisch J., Becker G.T., On the scaling of machine learning attacks on PUFs with application to noise bifurcation, International Workshop on Radio Frequency Identification: Security and Privacy Issues, pp. 17-31, (2015)
[13]  
Ye J., Guo Q., Hu Y., Li H., Li X., Modeling attacks on strong physical unclonable functions strengthened by random number and weak PUF, 2018 IEEE 36th VLSI Test Symposium, pp. 1-6, (2018)
[14]  
Ruhrmair U., Holcomb D.E., PUFs at a glance, Proceedings of Design, Automation & Test in Europe Conference & Exhibition, pp. 1-6, (2014)
[15]  
Ganji F., Tajik S., Fabetaler F., Et al., Strong machine learning attack against PUFs with no mathematical model, Proceedings of Cryptographic Hardware and Embedded Systems, pp. 389-411, (2016)
[16]  
Guo Q., Ye J., Gong Y., Et al., Efficientattack on non-linear current mirror PUF with genetic algorithm, Asian Test Symposium, pp. 49-54, (2016)
[17]  
Vijayakumar A., Patil V.C., Prado C.B., Et al., Machine learning resistant strong PUF: possible or a pipe dream?, IEEE International Symposium on Hardware Oriented Security and Trust, pp. 19-24, (2016)
[18]  
Herrewege A.V., Katzenbeisser S., Maes R., Et al., Reversefuzzy extractors: enabling lightweight mutual authentication for PUF-enabled RFIDs, Financial Cryptography and Data Security, pp. 374-389, (2012)
[19]  
Majzoobi M., Rostami M., Koushanfar F., Et al., Slender PUF protocol: a lightweight, robust, and secure authentication by substring matching, Proceedings of IEEE Symposium on Security and Privacy Workshops, pp. 33-44, (2012)
[20]  
Gassend B., Clarke D., Dijk M.V., Et al., Controlled physical random functions, Proceedings of Computer Security Applications Conference, pp. 149-160, (2007)