Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/FDTC.2015.19guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Laser Fault Attack on Physically Unclonable Functions

Published: 13 September 2015 Publication History
  • Get Citation Alerts
  • Abstract

    Physically Unclonable Functions (PUFs) are introduced to remedy the shortcomings of traditional methods of secure key storage and random key generation on Integrated Circuits (ICs). Due to their effective and low-cost implementations, intrinsic PUFs are popular PUF instances employed to improve the security of different applications on reconfigurable hardware. In this work we introduce a novel laser fault injection attack on intrinsic PUFs by manipulating the configuration of logic cells in a programable logic device. We present two fault attack scenarios, where not only the effectiveness of modeling attacks can be dramatically increased, but also the entropy of the targeted PUF responses are drastically decreased. In both cases, we conduct detailed theoretical analyses by considering XOR arbiter PUFs and RO PUFs as the examples of PUF-based authenticators and PUF-based random key generators, respectively. Finally we present our experimental results based on conducting laser fault injection on real PUFs, implemented on a common complex programmable logic device manufactured in 180 nm technology.

    Cited By

    View all
    • (2023)A Survey on FPGA Cybersecurity Design StrategiesACM Transactions on Reconfigurable Technology and Systems10.1145/356151516:2(1-33)Online publication date: 11-Mar-2023
    • (2022)Hardware Moving Target Defenses against Physical AttacksProceedings of the 9th ACM Workshop on Moving Target Defense10.1145/3560828.3564010(25-36)Online publication date: 11-Nov-2022
    • (2021)A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection MechanismsACM Transactions on Design Automation of Electronic Systems10.1145/347193627:1(1-35)Online publication date: 13-Sep-2021
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    FDTC '15: Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
    September 2015
    110 pages
    ISBN:9781467375795

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 13 September 2015

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)A Survey on FPGA Cybersecurity Design StrategiesACM Transactions on Reconfigurable Technology and Systems10.1145/356151516:2(1-33)Online publication date: 11-Mar-2023
    • (2022)Hardware Moving Target Defenses against Physical AttacksProceedings of the 9th ACM Workshop on Moving Target Defense10.1145/3560828.3564010(25-36)Online publication date: 11-Nov-2022
    • (2021)A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection MechanismsACM Transactions on Design Automation of Electronic Systems10.1145/347193627:1(1-35)Online publication date: 13-Sep-2021
    • (2019)Physical Layer Security in Optical NetworksOptical Network Design and Modeling10.1007/978-3-030-38085-4_35(412-424)Online publication date: 13-May-2019
    • (2018)Advances and throwbacks in hardware-assisted securityProceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems10.5555/3283552.3283567(1-10)Online publication date: 30-Sep-2018
    • (2017)Photonic Side-Channel Analysis of Arbiter PUFsJournal of Cryptology10.1007/s00145-016-9228-630:2(550-571)Online publication date: 1-Apr-2017

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media