رکورد قبلیرکورد بعدی

" On the physical security of physically unclonable functions / "


Document Type : BL
Record Number : 864979
Main Entry : Tajik, Shahin
Title & Author : On the physical security of physically unclonable functions /\ Shahin Tajik.
Publication Statement : Cham, Switzerland :: Springer,, 2018.
Series Statement : T-Labs series in telecommunication services,
Page. NO : 1 online resource
ISBN : 3319758209
: : 9783319758206
: 3319758195
: 9783319758190
Bibliographies/Indexes : Includes bibliographical references.
Contents : Intro; List of Publications; Contents; Abbreviations; List of Figures; List of Tables; Abstract; 1 Introduction; 1.1 Motivation and Background; 1.1.1 Reconfigurable Hardware; 1.1.2 Physical Attacks; 1.1.3 Physically Unclonable Function; 1.2 Problem Statement; 1.3 Scientific Contribution; 1.4 Thesis Structure; 2 Background; 2.1 Physically Unclonable Functions; 2.1.1 Arbiter PUF; 2.1.2 Ring-Oscillator PUF; 2.1.3 Are PUFs Tamper-Evident?; 2.2 Reconfigurable Hardware; 2.2.1 Security During Configuration; 2.2.2 PUF Implementations on FPGAs; 2.3 Semi-Invasive Attacks
: 2.3.1 Photonic Emission Analysis2.3.2 Laser Fault Injection; 2.3.3 Optical Contactless Probing; 2.4 Related Work; 3 Experimental Setup; 3.1 Devices Under Test; 3.1.1 Intel/Altera MAX V CPLD; 3.1.2 Intel/Altera Cyclone IV FPGA; 3.2 Hardware Implementations; 3.2.1 Standalone PUF Implementations; 3.2.2 Red Key Calculation; 3.2.3 PUF-Based Sensor; 3.3 Optical Setup; 3.3.1 Photonic Emission Analysis Setup; 3.3.2 Laser Fault Injection Setup; 3.3.3 Optical Contactless Probing Setup; 4 Photonic Side-Channel Analysis; 4.1 Attack Scenario; 4.1.1 Characterization of Multiplexer-Based Arbiter PUF
: 4.1.2 Characterization of Inverter-Based Arbiter PUF4.2 Results; 4.3 Discussion and Potential Countermeasures; 4.3.1 Feasibility of the Attack; 4.3.2 Photonic-Side Channel Attack Versus Modeling Attack; 4.3.3 Applicability of the Attack on Smaller Technologies; 4.3.4 Countermeasures; 5 Laser Fault Injection; 5.1 Attack Scenarios; 5.1.1 LFI Attack Against XOR Arbiter PUFs; 5.1.2 LFI Attack Against RO PUFs; 5.2 Results; 5.3 Discussion and Potential Countermeasures; 5.3.1 Scalability of the Attack; 5.3.2 Applicability of the Attack; 5.3.3 Countermeasures; 6 Optical Contactless Probing
: 6.1 Attack Scenario6.1.1 Key Extraction; 6.1.2 RO PUF Characterization; 6.2 Results; 6.2.1 Key Extraction; 6.2.2 RO Characterization; 6.3 Discussion; 6.3.1 Locating the Registers and IP Cores on the Chip; 6.3.2 Feasibility and Scalability of the Attack; 6.3.3 Tamper Evidence; 6.4 Potential Countermeasure; 6.4.1 Requirements for PUFs as Sensors; 6.4.2 Sensor Candidates; 6.4.3 Combining RO Sum PUFs and RONs; 6.4.4 Enrollment and Verification; 6.4.5 Monitoring of Optical Probing Attempts; 6.4.6 Strengths and Weaknesses of PUFMon; 7 Conclusion and Future Work; References
Subject : Adaptive computing systems.
Subject : Computer security.
Subject : Adaptive computing systems.
Subject : Algorithms data structures.
Subject : Circuits components.
Subject : Computer security.
Subject : COMPUTERS-- Security-- General.
Subject : Imaging systems technology.
Subject : Security fire alarm systems.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟