Document Type
|
:
|
BL
|
Record Number
|
:
|
864979
|
Main Entry
|
:
|
Tajik, Shahin
|
Title & Author
|
:
|
On the physical security of physically unclonable functions /\ Shahin Tajik.
|
Publication Statement
|
:
|
Cham, Switzerland :: Springer,, 2018.
|
Series Statement
|
:
|
T-Labs series in telecommunication services,
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
3319758209
|
|
:
|
: 9783319758206
|
|
:
|
3319758195
|
|
:
|
9783319758190
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references.
|
Contents
|
:
|
Intro; List of Publications; Contents; Abbreviations; List of Figures; List of Tables; Abstract; 1 Introduction; 1.1 Motivation and Background; 1.1.1 Reconfigurable Hardware; 1.1.2 Physical Attacks; 1.1.3 Physically Unclonable Function; 1.2 Problem Statement; 1.3 Scientific Contribution; 1.4 Thesis Structure; 2 Background; 2.1 Physically Unclonable Functions; 2.1.1 Arbiter PUF; 2.1.2 Ring-Oscillator PUF; 2.1.3 Are PUFs Tamper-Evident?; 2.2 Reconfigurable Hardware; 2.2.1 Security During Configuration; 2.2.2 PUF Implementations on FPGAs; 2.3 Semi-Invasive Attacks
|
|
:
|
2.3.1 Photonic Emission Analysis2.3.2 Laser Fault Injection; 2.3.3 Optical Contactless Probing; 2.4 Related Work; 3 Experimental Setup; 3.1 Devices Under Test; 3.1.1 Intel/Altera MAX V CPLD; 3.1.2 Intel/Altera Cyclone IV FPGA; 3.2 Hardware Implementations; 3.2.1 Standalone PUF Implementations; 3.2.2 Red Key Calculation; 3.2.3 PUF-Based Sensor; 3.3 Optical Setup; 3.3.1 Photonic Emission Analysis Setup; 3.3.2 Laser Fault Injection Setup; 3.3.3 Optical Contactless Probing Setup; 4 Photonic Side-Channel Analysis; 4.1 Attack Scenario; 4.1.1 Characterization of Multiplexer-Based Arbiter PUF
|
|
:
|
4.1.2 Characterization of Inverter-Based Arbiter PUF4.2 Results; 4.3 Discussion and Potential Countermeasures; 4.3.1 Feasibility of the Attack; 4.3.2 Photonic-Side Channel Attack Versus Modeling Attack; 4.3.3 Applicability of the Attack on Smaller Technologies; 4.3.4 Countermeasures; 5 Laser Fault Injection; 5.1 Attack Scenarios; 5.1.1 LFI Attack Against XOR Arbiter PUFs; 5.1.2 LFI Attack Against RO PUFs; 5.2 Results; 5.3 Discussion and Potential Countermeasures; 5.3.1 Scalability of the Attack; 5.3.2 Applicability of the Attack; 5.3.3 Countermeasures; 6 Optical Contactless Probing
|
|
:
|
6.1 Attack Scenario6.1.1 Key Extraction; 6.1.2 RO PUF Characterization; 6.2 Results; 6.2.1 Key Extraction; 6.2.2 RO Characterization; 6.3 Discussion; 6.3.1 Locating the Registers and IP Cores on the Chip; 6.3.2 Feasibility and Scalability of the Attack; 6.3.3 Tamper Evidence; 6.4 Potential Countermeasure; 6.4.1 Requirements for PUFs as Sensors; 6.4.2 Sensor Candidates; 6.4.3 Combining RO Sum PUFs and RONs; 6.4.4 Enrollment and Verification; 6.4.5 Monitoring of Optical Probing Attempts; 6.4.6 Strengths and Weaknesses of PUFMon; 7 Conclusion and Future Work; References
|
Subject
|
:
|
Adaptive computing systems.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Adaptive computing systems.
|
Subject
|
:
|
Algorithms data structures.
|
Subject
|
:
|
Circuits components.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
COMPUTERS-- Security-- General.
|
Subject
|
:
|
Imaging systems technology.
|
Subject
|
:
|
Security fire alarm systems.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25
|