Filters








69 Hits in 4.8 sec

On the Pitfalls of Using Arbiter-PUFs as Building Blocks

Georg T. Becker
2015 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
In these model building attacks, machine learning is used to determine the internal parameters of the PUF to build an accurate software model.  ...  PUFs use the inherent physical differences of every chip to either securely authenticate the chip or generate cryptographic keys without the need of nonvolatile memory.  ...  Hence, by either using a more secure PUF as a building block or by choosing a much larger BCH code the attack could be prevented.  ... 
doi:10.1109/tcad.2015.2427259 fatcat:ntwwiiuic5cgvgdixigkrtw3aa

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
This building block can hence be understood as the silicon equivalent of human biometrics.  ...  On the bright side, the lessons learned can help improve the quality of future PUF-based systems.  ...  Acknowledgements The authors acknowledge that the responses of a PUF are noisy and mention the existence of fuzzy extractors [39] as well.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq

A Lightweight Hardware Secure and Reliable Framework using Secure and Provable PUF for IoT Devices against the Machine Learning Attack

K. Y. Annapurna, Deepali Koppad
2022 North atlantic university union: International Journal of Circuits, Systems and Signal Processing  
so on.  ...  , and SVM; further evaluation is carried out considering the PUF evaluation parameter as uniqueness and reliability.  ...  Becker, “On the pitfalls of using Arbiter-PUFs as building blocks,” TCAD, vol. 34, no. 8, pp. 1295– 1307, 2015. [19]. C.  ... 
doi:10.46300/9106.2022.16.86 fatcat:7na6rztqyrdfhcfeae6nhicbuu

PUFs as Promising Tools for Security in Internet of Things

Debdeep Mukhopadhyay
2016 IEEE design & test  
This work was supported in part by the Challenge Grant from the Indian Institute of Technology (IIT), Kharagpur, India and Information Security Education Awareness (ISEA), Deity, India.  ...  Sadhukhan, a doctoral student, for helping with the testbed.  ...  The LSPUF typically uses lightweight and insecure PUF instances as component building blocks which can be modeled by machine learning (ML).  ... 
doi:10.1109/mdat.2016.2544845 fatcat:5i7oiwl65jfmpemvk4chlg7ayi

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs [chapter]

Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
2012 Lecture Notes in Computer Science  
In this context, we introduce reverse fuzzy extractors, a new approach to correct noise in PUF responses that allows for extremely lightweight implementations on the token.  ...  , and supports an unlimited number of authentications without requiring the reader to store a large number of PUF challenge/response pairs.  ...  This work has been supported in part by the European Commission under grant agreement ICT-2007-238811 UNIQUE.  ... 
doi:10.1007/978-3-642-32946-3_27 fatcat:pan7hqz3mfbdxb5ktbgtbieu34

Erasable PUFs

Chenglu Jin, Wayne Burleson, Marten van Dijk, Ulrich Rührmair
2020 Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security  
We describe how the Strong PUF can be surrounded with a trusted control logic that allows the blocking (or łerasurež) of single CRPs.  ...  Building on this work, this paper is the first to describe a generic method how any given silicon Strong PUF with digital CRP-interface can be turned into an Erasable PUF.  ...  Interpose PUFs are constructed from Arbiter PUFs of variable length, and consist of several parallel layers of these Arbiter PUFs, similar to the well-known XOR Arbiter PUF architectures [45] .  ... 
doi:10.1145/3411504.3421215 fatcat:rcux5s5l5bfipg3yz3xa2yh5wm

Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy

Rameez Asif, Kinan Ghanem, James Irvine
2020 Sensors  
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article.  ...  In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and  ...  ) and use-cases in the energy utilities.  ... 
doi:10.3390/s21010028 pmid:33374599 pmcid:PMC7793093 fatcat:h2b4djvqojdehjxrku4nkjl2dq

Machine Learning of Physical Unclonable Functions using Helper Data

Emanuele Strieder, Christoph Frisch, Michael Pehl
2021 Transactions on Cryptographic Hardware and Embedded Systems  
We provide results based on simulated data of a k-SUM PUF model and an Arbiter PUF model.  ...  This work, however, reveals a pitfall in these constructions: When using state-of-the-art helper data algorithms to correct noisy PUF responses, an attacker can exploit the publicly accessible helper data  ...  Acknowledgements This work was partly funded by the German Ministry of Education, Research and Technology through the project SecForCARs (grant number 16KIS0795).  ... 
doi:10.46586/tches.v2021.i2.1-36 fatcat:5alolkueozghfp6tasykm2pf6y

SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version

Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl
2020 Journal of Cryptographic Engineering  
We provide empirical results proving the side-channel security of the protected cryptographic engine as well as an evaluation of the PUF quality.  ...  The lack of accessible secret key storage poses a significant challenge and requires the use of a physical unclonable function (PUF) to generate a device intrinsic secret within the FPGA logic.  ...  Building blocks In this section, we describe the functionality of the hardware building blocks that make up the static FPGA configuration of our system: the PUF that generates a device intrinsic secret  ... 
doi:10.1007/s13389-020-00247-2 fatcat:xgnl4djeznckzatufxling2ywq

End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol [chapter]

Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung
2015 Lecture Notes in Computer Science  
The prototype is implemented on a SASEBO-GII board, using the on-board SRAM as the source of entropy for the PUF and the TRNG. We present three different implementations.  ...  The reported results include a full protocol analysis, the design of its building blocks, their integration into a constrained device, and finally its performance evaluation.  ...  We build our prototype on top of a SASEBO-GII board, using the resources available on the board to construct the PUF and the protocol engine.  ... 
doi:10.1007/978-3-662-48324-4_28 fatcat:fhmywbr5mvbelkci34magnxzpq

A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF based Authentication

Chongyan Gu, Chip-Hong Chang, Weiqiang Liu, Shichao Yu, Yale Wang, Maire OrNeill
2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
imposed on the type of PUF design or any additional protection on the binary channel used for the authentication.  ...  CONCLUSION Security solutions today focus mostly on blocking attacks.  ... 
doi:10.1109/tcad.2020.3036807 fatcat:mmffbdfnofcp3jrsyrn4wyxk6e

On the Genotype Compression and Expansion for Evolutionary Algorithms in the Continuous Domain [article]

Lucija Planinic, Marko Djurasevic, Luca Mariot, Domagoj Jakobovic, Stjepan Picek, Carlos Coello Coello
2021 arXiv   pre-print
This paper investigates the influence of genotype size on evolutionary algorithms' performance.  ...  We consider genotype compression (where genotype is smaller than phenotype) and expansion (genotype is larger than phenotype) and define different strategies to reconstruct the original variables of the  ...  Usually, strong PUFs rely on delayed-based Arbiter PUFs (APUFs) as their main building blocks for PUF constructs and protocols [24] .  ... 
arXiv:2105.11502v1 fatcat:dmffglpqorf6nknl66vg5jun2y

Secure Key Generation from Biased PUFs [chapter]

Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems
2015 Lecture Notes in Computer Science  
PUF-based key generators based on error-correcting codes were firstly introduced in [12] for Arbiter PUFs and later on in [5] for SRAM PUFs, both using a configuration based on linear block codes.  ...  Using innovative approaches, the overhead of these algorithms on PUF size is minimized, while guaranteeing reliability of the system. Related Work.  ...  The conclusion of Theorem 4 holds for classic VN debiasing with erasures. It can be extended to pair-output VN debiasing in the same way as 2O-VN.  ... 
doi:10.1007/978-3-662-48324-4_26 fatcat:lz5d5qfzu5anffgk3md2lp3gbu

Efficient Fuzzy Extraction Of Puf-Induced Secrets: Theory And Applications

Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day Yu
2016 Zenodo  
The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system.  ...  The overall efficiency thereof, typically depending on error-correction with a binary [n; k; d] block code, is determined by the universal and well-known (n - k) bound on the min-entropy loss.  ...  Acknowledgment The authors greatly appreciate the support received. The European Union's  ... 
doi:10.5281/zenodo.55449 fatcat:472252ayczdsnnzo3zjk2edg7i

Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications [chapter]

Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day Yu
2016 Lecture Notes in Computer Science  
The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system.  ...  The overall efficiency thereof, typically depending on error-correction with a binary [n, k, d] block code, is determined by the universal and well-known (n − k) bound on the min-entropy loss.  ...  Acknowledgment The authors greatly appreciate the support received. The European Union's  ... 
doi:10.1007/978-3-662-53140-2_20 fatcat:famnb652sreyld2sbg77x5sicy
« Previous Showing results 1 — 15 out of 69 results