2013 Workshop on Fault Diagnosis and Tolerance in Cryptography 2013
DOI: 10.1109/fdtc.2013.19
|View full text |Cite
|
Sign up to set email alerts
|

Invasive PUF Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 111 publications
(64 citation statements)
references
References 19 publications
0
64
0
Order By: Relevance
“…Furthermore, it is assumed that PUFs are tamper-evident and any invasive attempt to characterize the PUF or probe the PUF responses destroys the PUF, which leads to the loss of the secret. The latter assumption is proved to be invalid since a set of attacks in the literature has been reported, which could break the security of a set of PUF architecture by semi-invasive and fully-invasive attacks [54,34,64].…”
Section: Problem Statementmentioning
confidence: 99%
“…Furthermore, it is assumed that PUFs are tamper-evident and any invasive attempt to characterize the PUF or probe the PUF responses destroys the PUF, which leads to the loss of the secret. The latter assumption is proved to be invalid since a set of attacks in the literature has been reported, which could break the security of a set of PUF architecture by semi-invasive and fully-invasive attacks [54,34,64].…”
Section: Problem Statementmentioning
confidence: 99%
“…As for SRAM PUFs, they are susceptible to extreme operating conditions [52] and physical tampering [53]. As a result, the SRAM PUF hardware can be physically inspected and modified [54]. Furthermore, it was established by Helfmeier et al [53] that upon gaining the response of an SRAM PUF, C 1 , a focus ion 132 | P a g e www.ijacsa.thesai.org beam (FIB) can be utilized to alter the circuits of SRAM PUF, C 2 so that C 2 will have a very similar challenge/response behavior as C 1 .…”
Section: ) Attacks On Weak Pufsmentioning
confidence: 99%
“…side channel [6,28,34], invasive [27,29], and fault injection attacks [7,37]. To our knowledge there is no known strong PUF design that is secure against physical attacks without classical hardware security measures that are also applied to secure flash memory.…”
Section: Resilience Against Physical Attacksmentioning
confidence: 99%