Side-channel assisted modeling attacks on feed-forward arbiter PUFs using silicon data

18Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Physically Unclonable Functions (PUFs) are used for generating unique signatures from the complex manufacturing variations in integrated circuits. However, the majority of PUFs have been shown to be vulnerable to modeling attacks. In this work, we take a closer look at the vulnerability of feed-forward arbiter PUFs towards a combined side-channel and modeling attack using data measured from our 32nm test chips. The side-channel information from the feed-forward PUF construction is used as a catalyst for improving the performance of modeling attacks. This hybrid attack helps to push the prediction accuracies to very high limits (>98.5%), especially for larger PUF circuits. The hybrid attack yields around 7% improvement in prediction rates when compared to a conventional modeling attack mounted under the presence of error-inflicted challenge-response pairs.

Cite

CITATION STYLE

APA

Kumar, R., & Burleson, W. (2015). Side-channel assisted modeling attacks on feed-forward arbiter PUFs using silicon data. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9440, pp. 53–67). Springer Verlag. https://doi.org/10.1007/978-3-319-24837-0_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free