2021
DOI: 10.1142/s0218126621300099
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on the Susceptibility of PUFs to Invasive, Semi-Invasive and Noninvasive Attacks: Challenges and Opportunities for Future Directions

Abstract: Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a hardware root-of-trust for integrated circuit (IC) applications. PUFs exploit the intrinsic process variations that map a set of challenges to a set of responses. The intrinsic process variations are caused by uncontrollable deviations in the IC manufacturing process, which are unique and random from die to die and wafer to wafer. As the PUF output is device-specific, PUFs can, therefore, be used in IC identificati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 69 publications
0
4
0
Order By: Relevance
“…For example, it might include the 'physical' susceptibility of a PUF, meaning how well CRPs can be detected using a side channel attack. 40,43 Or, it might represent how many CRPs are required to train an ML-based attack that can predict responses better than chance. 16-23, 25, 26, 33, 34, 42 Because a primary rationale for the photonic PUF is its lesser vulnerability to physical CRP-collection attacks, we assess susceptibility as the number of CRPs required to launch an ML-based attack that can predict responses for as-ofyet-unseen challenges with a probability greater than chance.…”
Section: Brief Introduction To Physically Unclonable Functionsmentioning
confidence: 99%
“…For example, it might include the 'physical' susceptibility of a PUF, meaning how well CRPs can be detected using a side channel attack. 40,43 Or, it might represent how many CRPs are required to train an ML-based attack that can predict responses better than chance. 16-23, 25, 26, 33, 34, 42 Because a primary rationale for the photonic PUF is its lesser vulnerability to physical CRP-collection attacks, we assess susceptibility as the number of CRPs required to launch an ML-based attack that can predict responses for as-ofyet-unseen challenges with a probability greater than chance.…”
Section: Brief Introduction To Physically Unclonable Functionsmentioning
confidence: 99%
“…In particular, resource-constrained IoT devices are more likely to be suffered from full and direct access [1], [2]. Attackers can directly access critical data and even digital keys stored in the chip through hardware attack techniques such as physical probing, invasive, and semiinvasive [3]. Therefore, traditional security techniques are no longer sufficient to ensure the security of IoT systems, and more secure and efficient protection measures are required.…”
Section: Introductionmentioning
confidence: 99%
“…Several PUFs have been proposed in the past [2], [3]. Static random-access memory PUF (SRAM-PUF) is one of the previously proposed PUFs and it is categorized as memory-based PUF [4], [5].…”
Section: Introductionmentioning
confidence: 99%