Difference between revisions of "Rostami2014"

From ACES

(Import from BibTeX)
 
m (Import from BibTeX)
Line 4: Line 4:
|keywords=Hardware security, Physical Unclonable Functions, security protocols
|keywords=Hardware security, Physical Unclonable Functions, security protocols
|abstract=<p>This paper proposes novel robust and low-overhead physical unclonable function (PUF) authentication and key exchange protocols that are resilient against reverse-engineering attacks. The protocols are executed between a party with access to a physical PUF (prover) and a trusted party who has access to the PUF compact model (verifier). The proposed protocols do not follow the classic paradigm of exposing the full PUF responses or a transformation of them. Instead, random subsets of the PUF response strings are sent to the verifier so the exact position of the subset is obfuscated for the third-party channel observers. Authentication of the responses at the verifier side is done by matching the substring to the available full response string; the index of the matching point is the actual obfuscated secret (or key) and not the response substring itself. We perform a thorough analysis of resiliency of the protocols against various adversarial acts, including machine learning and statistical attacks. The attack analysis guides us in tuning the parameters of the protocol for an efficient and secure implementation. The low overhead and practicality of the protocols are evaluated and confirmed by hardware implementation.</p>
|abstract=<p>This paper proposes novel robust and low-overhead physical unclonable function (PUF) authentication and key exchange protocols that are resilient against reverse-engineering attacks. The protocols are executed between a party with access to a physical PUF (prover) and a trusted party who has access to the PUF compact model (verifier). The proposed protocols do not follow the classic paradigm of exposing the full PUF responses or a transformation of them. Instead, random subsets of the PUF response strings are sent to the verifier so the exact position of the subset is obfuscated for the third-party channel observers. Authentication of the responses at the verifier side is done by matching the substring to the available full response string; the index of the matching point is the actual obfuscated secret (or key) and not the response substring itself. We perform a thorough analysis of resiliency of the protocols against various adversarial acts, including machine learning and statistical attacks. The attack analysis guides us in tuning the parameters of the protocol for an efficient and secure implementation. The low overhead and practicality of the protocols are evaluated and confirmed by hardware implementation.</p>
|month=1
|year=2014
|volume=2
|volume=2
|journal=IEEE Transactions on Emerging Topics in Computing  
|journal=IEEE Transactions on Emerging Topics in Computing  
|title=Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
|title=Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
|entry=article
|entry=article
|date=2014-1/-01
}}
}}

Revision as of 03:41, 4 September 2021

Rostami2014
entryarticle
address
annote
authorMasoud Rostami and Mehrdad Majzoobi and Farinaz Koushanfar and Dan Wallach and Srini Devadas
booktitle
chapter
edition
editor
howpublished
institution
journalIEEE Transactions on Emerging Topics in Computing
month1
note
number
organization
pages
publisher
school
series
titleRobust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
type
volume2
year2014
doi
issn
isbn
urlhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=\&arnumber=6714458
pdf


Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093