메뉴 건너뛰기




Volumn 8731, Issue , 2014, Pages 476-492

Efficient power and timing side channels for physical unclonable functions

Author keywords

Hardware security; Machine learning; Modeling attacks; Physical unclonable functions (PUFs); Power side channel; Side channel attacks; Timing side channel

Indexed keywords

CLONE CELLS; HARDWARE SECURITY; LEARNING SYSTEMS; MACHINE LEARNING; TIMING CIRCUITS; EMBEDDED SYSTEMS;

EID: 84921514717     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44709-3_26     Document Type: Article
Times cited : (131)

References (31)
  • 2
    • 84883671628 scopus 로고    scopus 로고
    • Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
    • Delvaux, J., Verbauwhede, I.: Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. In: HOST (2013)
    • (2013) HOST
    • Delvaux, J.1    Verbauwhede, I.2
  • 3
    • 84905249876 scopus 로고    scopus 로고
    • Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
    • Delvaux, J., Verbauwhede, I.: Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation. IACR Cryptology ePrint Archive, Report 2013/566
    • (2013) IACR Cryptology ePrint Archive , pp. 566
    • Delvaux, J.1    Verbauwhede, I.2
  • 4
    • 84921511957 scopus 로고    scopus 로고
    • Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
    • Delvaux, J., Verbauwhede, I.: Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation. IACR Cryptology ePrint Archive, Report 2013/610
    • (2013) IACR Cryptology ePrint Archive , pp. 610
    • Delvaux, J.1    Verbauwhede, I.2
  • 5
    • 84887308412 scopus 로고    scopus 로고
    • Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
    • Delvaux, J., Verbauwhede, I.: Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes. IACR Cryptology ePrint Archive, Report 2013/619
    • (2013) IACR Cryptology ePrint Archive , pp. 619
    • Delvaux, J.1    Verbauwhede, I.2
  • 6
    • 84859704281 scopus 로고    scopus 로고
    • Physical unclonable functions and secure processors
    • In: Clavier, C., Gaj, K. (eds.), Springer, Heidelberg
    • Devadas, S.: Physical unclonable functions and secure processors. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 65–65. Springer, Heidelberg (2009)
    • (2009) CHES 2009. LNCS , vol.5747 , pp. 65
    • Devadas, S.1
  • 17
    • 85037371734 scopus 로고    scopus 로고
    • Side-Channel Analysis of PUFs and Fuzzy Extractors
    • In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.), Springer, Heidelberg
    • Merli, D., Schuster, D., Stumpf, F., Sigl, G.: Side-Channel Analysis of PUFs and Fuzzy Extractors. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 33–47. Springer, Heidelberg (2011)
    • (2011) Trust 2011. LNCS , vol.6740 , pp. 33-47
    • Merli, D.1    Schuster, D.2    Stumpf, F.3    Sigl, G.4
  • 23
    • 84943274699 scopus 로고
    • A direct adaptive method for faster backpropagation learning: The RPROP algorithm
    • Riedmiller, M., Braun, H.: A direct adaptive method for faster backpropagation learning: The RPROP algorithm. In: IEEE International Conference on Neural Networks, pp. 586–591 (1993)
    • (1993) IEEE International Conference on Neural Networks , pp. 586-591
    • Riedmiller, M.1    Braun, H.2
  • 24
    • 79957692700 scopus 로고    scopus 로고
    • Security based on Physical Unclonability and Disorder
    • uhrmair , U. , Devadas , S. , Koushanfar , F.
    • Rührmair, U., Devadas, S., Koushanfar, F.: Security based on Physical Unclonability and Disorder. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust, Springer, Heidelberg (2011)
    • (2011) Introduction to Hardware Security and Trust
    • uhrmair, R.1
  • 25
    • 84866707867 scopus 로고    scopus 로고
    • Practical security analysis of PUF-based two-player protocols
    • uhrmair , U. , van Dijk , M.
    • Rührmair, U., van Dijk, M.: Practical security analysis of PUF-based two-player protocols. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 251–267. Springer, Heidelberg (2012)
    • (2012) CHES 2012. LNCS , vol.7428 , pp. 251-267
    • uhrmair, R.1
  • 26
    • 84881249992 scopus 로고    scopus 로고
    • PUFs in Security Protocols: Attack Models and Security Evaluations
    • < uhrmair , U. , van Dijk , M.
    • Rührmair, U., van Dijk, M.: PUFs in Security Protocols: Attack Models and Security Evaluations. In: IEEE Symposium on Security and Privacy, Oakland 2013 (2013)
    • (2013) IEEE Symposium on Security and Privacy, Oakland 2013
    • uhrmair, R.1
  • 27
    • 84903849908 scopus 로고    scopus 로고
    • PUFs at a glance
    • < uhrmair , U. , Holcomb , D.E.
    • Rührmair, U., Holcomb, D.E.: PUFs at a glance. In: DATE 2014, pp. 1–6 (2014)
    • (2014) DATE 2014 , pp. 1-6
    • uhrmair, R.1
  • 28
    • 78649989155 scopus 로고    scopus 로고
    • Schmidhuber, J.:Modeling Attacks on Physical Unclonable Functions
    • << uhrmair , U. , Sehnke , F. , S , olter , J. , Dror , G. , Devadas , S.
    • Rührmair, U., Sehnke, F., S¨olter, J., Dror, G., Devadas, S., Schmidhuber, J.:Modeling Attacks on Physical Unclonable Functions. In: ACM Conference on Computer and Communications Security (2010)
    • (2010) ACM Conference on Computer and Communications Security
    • uhrmair, R.1
  • 29
    • 76949086041 scopus 로고    scopus 로고
    • On the Foundations of Physical Unclonable Functions
    • < uhrmair , U. , S , olter , J. , Sehnke , F.
    • Rührmair, U., S¨olter, J., Sehnke, F.: On the Foundations of Physical Unclonable Functions. Cryptology e-Print Archive (June 2009)
    • (2009) Cryptology e-Print Archive
    • uhrmair, R.1
  • 30
    • 84887313066 scopus 로고    scopus 로고
    • uhrmair , U. , S , olter , J. , Sehnke , F. , Xu , X. , Mahmoud , A. , Stoyanova , V. , Dror , G. , Schmidhuber , J. , Burleson , W. , Devadas , S.
    • Rührmair, U., S¨olter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W., Devadas, S.: PUF Modeling Attacks on Simulated and Silicon Data. IEEE Transactions on Information Forensics and Security, IEEE T-IFS (2013)
    • (2013) PUF Modeling Attacks on Simulated and Silicon Data
    • uhrmair, R.1
  • 31
    • 34547307341 scopus 로고    scopus 로고
    • Physical Unclonable Functions for Device Authentication and Secret Key Generation
    • Edward Suh, G.: Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: DAC 2007, pp. 9–14 (2007)
    • (2007) DAC 2007 , pp. 9-14
    • Edward Suh, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.