Difference between revisions of "Mahmoud2013"

From ACES

(Import from BibTeX)
 
m (Default pdf)
 
(One intermediate revision by the same user not shown)
Line 4: Line 4:
|keywords=implementation / Strong PUFs, Lightweight PUF, Modeling Attacks, Side Channel Attacks, XOR Arbiter PUF
|keywords=implementation / Strong PUFs, Lightweight PUF, Modeling Attacks, Side Channel Attacks, XOR Arbiter PUF
|abstract=<p>Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core properties have been reported. They concern their physical and digital unclonability, as well as their assumed resilience against invasive or side channel attacks. In this paper, we join some of these techniques in order to further improve their effectiveness. The combination of machine-learning based modeling techniques with side channel information allows us to attack so-called XOR Arbiter PUFs and Lightweight PUFs up to a size and complexity that was previously out of reach. For Lightweight PUFs, for example, we report successful attacks for bitlengths of 64, 128 and 256, and for up to nine single Arbiter PUFs whose output is XORed. Previous work at CCS 2010 and IEEE TIFS 2013, which provides the currently most efficient modeling results, had only been able to attack this structure for up to five XORs and bitlength 64.\&nbsp;Our attack employs the first power side channel (PSC) for Strong PUFs in the literature. This PSC tells the attacker the number of single Arbiter PUF within an XOR Arbiter PUF or Lightweight PUF architecture that are zero or one. This PSC is of little value if taken by itself, but strongly improves an attacker\&rsquo;s capacity if suitably combined with modeling techniques. At the end of the paper, we discuss efficient and simple countermeasures against this PSC, which could be used to secure future PUF generations.</p>
|abstract=<p>Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core properties have been reported. They concern their physical and digital unclonability, as well as their assumed resilience against invasive or side channel attacks. In this paper, we join some of these techniques in order to further improve their effectiveness. The combination of machine-learning based modeling techniques with side channel information allows us to attack so-called XOR Arbiter PUFs and Lightweight PUFs up to a size and complexity that was previously out of reach. For Lightweight PUFs, for example, we report successful attacks for bitlengths of 64, 128 and 256, and for up to nine single Arbiter PUFs whose output is XORed. Previous work at CCS 2010 and IEEE TIFS 2013, which provides the currently most efficient modeling results, had only been able to attack this structure for up to five XORs and bitlength 64.\&nbsp;Our attack employs the first power side channel (PSC) for Strong PUFs in the literature. This PSC tells the attacker the number of single Arbiter PUF within an XOR Arbiter PUF or Lightweight PUF architecture that are zero or one. This PSC is of little value if taken by itself, but strongly improves an attacker\&rsquo;s capacity if suitably combined with modeling techniques. At the end of the paper, we discuss efficient and simple countermeasures against this PSC, which could be used to secure future PUF generations.</p>
|year=2013
|journal=Cryptology ePrint Archive, Report 2013/632
|journal=Cryptology ePrint Archive, Report 2013/632
|title=Combined Modeling and Side Channel Attacks on Strong PUFs
|title=Combined Modeling and Side Channel Attacks on Strong PUFs
|entry=article
|entry=article
|date=2013-01-01
|pdf=Mahmoud2013.pdf
}}
}}

Latest revision as of 17:37, 9 November 2021

Mahmoud2013
entryarticle
address
annote
authorMahmoud, Ahmed and R{\"u}hrmair,Ulrich and Mehrdad Majzoobi and Farinaz Koushanfar
booktitle
chapter
edition
editor
howpublished
institution
journalCryptology ePrint Archive, Report 2013/632
month
note
number
organization
pages
publisher
school
series
titleCombined Modeling and Side Channel Attacks on Strong PUFs
type
volume
year2013
doi
issn
isbn
urlhttp://eprint.iacr.org/2013/632
pdfMahmoud2013.pdf

File:Mahmoud2013.pdf

Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093