DocumentCode :
129520
Title :
Hybrid side-channel/machine-learning attacks on PUFs: A new threat?
Author :
Xiaolin Xu ; Burleson, Wayne
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Massachusetts Amherst, Amherst, MA, USA
fYear :
2014
fDate :
24-28 March 2014
Firstpage :
1
Lastpage :
6
Abstract :
Machine Learning (ML) is a well-studied strategy in modeling Physical Unclonable Functions (PUFs) but reaches its limits while applied on instances of high complexity. To address this issue, side-channel attacks have recently been combined with modeling techniques to make attacks more efficient [25][26]. In this work, we present an overview and survey of these so-called “hybrid modeling and side-channel attacks” on PUFs, as well as of classical side channel techniques for PUFs. A taxonomy is proposed based on the characteristics of different side-channel attacks. The practical reach of some published side-channel attacks is discussed. Both challenges and opportunities for PUF attackers are introduced. Countermeasures against some certain side-channel attacks are also analyzed. To better understand the side-channel attacks on PUFs, three different methodologies of implementing side-channel attacks are compared. At the end of this paper, we bring forward some open problems for this research area.
Keywords :
cryptography; learning (artificial intelligence); ML; PUFs; hybrid side-channel-machine-learning attacks; physical unclonable function modeling; taxonomy; Delays; Field programmable gate arrays; Mathematical model; Noise; Power demand; Silicon;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014
Conference_Location :
Dresden
Type :
conf
DOI :
10.7873/DATE.2014.362
Filename :
6800563
Link To Document :
بازگشت