Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808414.2808417acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On the Systematic Drift of Physically Unclonable Functions Due to Aging

Published: 16 October 2015 Publication History

Abstract

In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building block for security related scenarios like key storage and authentication. PUFs are physical systems and as such their responses are inherently noisy, precluding a straightforward derivation of cryptographic key material from raw PUF measurements. To overcome this drawback, Fuzzy Extractors are used to eliminate the noise and guarantee robust outputs. A special type are Reverse Fuzzy Extractors, shifting the computational load of error correction towards a computationally powerful verifier. However, the Reverse Fuzzy Extractor reveals error patterns to any eavesdropper, which may cause privacy issues (if the PUF key is drifting, the error pattern is linkable to the identity) and even security problems (if the noise is data-dependent and multiple protocol transcripts can be linked to the same user). In this work we evaluate the effects of aging on popular PUF implementations and investigate its impact on the security properties of the Reverse Fuzzy Extractor.

References

[1]
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal on Computing, pages 97--139, 2008.
[2]
A. Herrewege, S. Katzenbeisser, R. Maes, R. Peeters, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann. Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. In Financial Cryptography and Data Security, pages 374--389. 2012.
[3]
R. Maes and I. Verbauwhede. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. In Towards Hardware-Intrinsic Security, Information Security and Cryptography, pages 3--37. 2010.
[4]
U. Rührmair, H. Busch, and S. Katzenbeisser. Strong PUFs: Models, Constructions, and Security Proofs. In Towards Hardware-Intrinsic Security, pages 79--96. 2010.
[5]
S. Schulz, A.-R. Sadeghi, and C. Wachsmann. Short Paper: Lightweight Remote Attestation Using Physical Functions. In Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec), pages 109--114, 2011.
[6]
P. Tuyls, G.-J. Schrijen, F. Willems, T. Ignatenko, and B. Skorić. Secure key storage with PUFs. Security with Noisy Data-On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, pages 269--292, 2007.
[7]
R. van den Berg, B. Skorić, and V. van der Leest. Bias-based Modeling and Entropy Analysis of PUFs. TrustED '13, pages 13--20, 2013.
[8]
B. Skorić and N. de Vreede. The Spammed Code Offset Method. IEEE Transactions on Information Forensics and Security, pages 875--884, 2014.

Cited By

View all
  • (2019)Decay-Based DRAM PUFs in Commodity DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.282229816:3(462-475)Online publication date: 1-May-2019
  • (2018)Eliminating Leakage in Reverse Fuzzy ExtractorsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.277450013:4(954-964)Online publication date: Apr-2018
  • (2016)Run-Time Accessible DRAM PUFs in Commodity DevicesCryptographic Hardware and Embedded Systems – CHES 201610.1007/978-3-662-53140-2_21(432-453)Online publication date: 4-Aug-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
TrustED '15: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices
October 2015
72 pages
ISBN:9781450338288
DOI:10.1145/2808414
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. error correction
  2. information leakage
  3. physically unclonable functions

Qualifiers

  • Research-article

Conference

CCS'15
Sponsor:

Acceptance Rates

TrustED '15 Paper Acceptance Rate 6 of 11 submissions, 55%;
Overall Acceptance Rate 24 of 49 submissions, 49%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)2
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Decay-Based DRAM PUFs in Commodity DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.282229816:3(462-475)Online publication date: 1-May-2019
  • (2018)Eliminating Leakage in Reverse Fuzzy ExtractorsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.277450013:4(954-964)Online publication date: Apr-2018
  • (2016)Run-Time Accessible DRAM PUFs in Commodity DevicesCryptographic Hardware and Embedded Systems – CHES 201610.1007/978-3-662-53140-2_21(432-453)Online publication date: 4-Aug-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media