Difference between revisions of "Majzoobi2012"

From ACES

(Import from BibTeX)
 
m (Import from BibTeX)
Line 3: Line 3:
|doi=10.1109/SPW.2012.30
|doi=10.1109/SPW.2012.30
|abstract=<p>We introduce Slender PUF protocol, an ef- ficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing the full PUF responses (or a transformation of the full string of responses) on the communication channel. Instead, random subsets of the responses are revealed and sent for authentication. The response patterns are used for authenticating the prover device with a very high probability. We perform a thorough analysis of the method\&rsquo;s resiliency to various attacks which guides adjustment of our protocol parameters for an efficient and secure implementation. We demonstrate that Slender PUF protocol, if carefully designed, will be resilient against all known machine learning attacks. In addition, it has the great advantage of an inbuilt PUF error tolerance. Thus, Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques. The low overhead and practicality of the protocol are confirmed by a set of hardware implementation and evaluations.</p>
|abstract=<p>We introduce Slender PUF protocol, an ef- ficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing the full PUF responses (or a transformation of the full string of responses) on the communication channel. Instead, random subsets of the responses are revealed and sent for authentication. The response patterns are used for authenticating the prover device with a very high probability. We perform a thorough analysis of the method\&rsquo;s resiliency to various attacks which guides adjustment of our protocol parameters for an efficient and secure implementation. We demonstrate that Slender PUF protocol, if carefully designed, will be resilient against all known machine learning attacks. In addition, it has the great advantage of an inbuilt PUF error tolerance. Thus, Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques. The low overhead and practicality of the protocol are confirmed by a set of hardware implementation and evaluations.</p>
|month=5
|year=2012
|booktitle=International Workshop on Trustworthy Embedded Devices
|booktitle=International Workshop on Trustworthy Embedded Devices
|title=Slender PUF Protocol: A lightweight, robust, and secure authentication by substring matching
|title=Slender PUF Protocol: A lightweight, robust, and secure authentication by substring matching
|entry=inproceedings
|entry=inproceedings
|date=2012-Ma-01
}}
}}

Revision as of 03:39, 4 September 2021

Majzoobi2012
entryinproceedings
address
annote
authorMehrdad Majzoobi and Masoud Rostami and Farinaz Koushanfar and Dan S. Wallach and Srinivas Devadas
booktitleInternational Workshop on Trustworthy Embedded Devices
chapter
edition
editor
howpublished
institution
journal
month5
note
number
organization
pages
publisher
school
series
titleSlender PUF Protocol: A lightweight, robust, and secure authentication by substring matching
type
volume
year2012
doi10.1109/SPW.2012.30
issn
isbn
url
pdf


Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093