Hybrid Side-Channel/Machine-Learning Attacks on PUFs: A New Threat?

被引:0
作者
Xu, Xiaolin [1 ]
Burleson, Wayne [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01002 USA
来源
2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE) | 2014年
关键词
AUTHENTICATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) is a well-studied strategy in modeling Physical Unclonable Functions (PUFs) but reaches its limits while applied on instances of high complexity. To address this issue, side-channel attacks have recently been combined with modeling techniques to make attacks more efficient [25][26]. In this work, we present an overview and survey of these so-called "hybrid modeling and side-channel attacks" on PUFs, as well as of classical side channel techniques for PUFs. A taxonomy is proposed based on the characteristics of different side-channel attacks. The practical reach of some published side-channel attacks is discussed. Both challenges and opportunities for PUF attackers are introduced. Countermeasures against some certain side-channel attacks are also analyzed. To better understand the side-channel attacks on PUFs, three different methodologies of implementing side-channel attacks are compared. At the end of this paper, we bring forward some open problems for this research area.
引用
收藏
页数:6
相关论文
共 34 条
[1]  
[Anonymous], ACM WORKSH EMB SYST
[2]  
[Anonymous], 1996, CRYPTO, DOI DOI 10.1007/3-540-68697-5_9
[3]  
[Anonymous], 2006, Pattern recognition and machine learning
[4]  
[Anonymous], ACM C COMP COMM SEC
[5]  
Back Thomas, 1996, EVOLUTIONARY ALGORIT
[6]  
Balliu M., 2009, PLAS 09, P5971
[7]  
Bernstein Daniel J, 2005, CACHE TIMING ATTACKS
[8]  
Brumley D, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P1
[9]  
Bruzska Christina, 2011, CRYPTO 2011
[10]  
Delvaux J., 2013, IACR CRYPTOLOGY EPRI, V2013, P619