On the Physical Security of Physically Unclonable Functions

This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injec...

Full description

Bibliographic Details
Main Author: Tajik, Shahin
Format: eBook
Language:English
Published: Cham Springer International Publishing 2019, 2019
Edition:1st ed. 2019
Series:T-Labs Series in Telecommunication Services
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02599nmm a2200349 u 4500
001 EB001800114
003 EBX01000000000000000973612
005 00000000000000.0
007 cr|||||||||||||||||||||
008 180405 ||| eng
020 |a 9783319758206 
100 1 |a Tajik, Shahin 
245 0 0 |a On the Physical Security of Physically Unclonable Functions  |h Elektronische Ressource  |c by Shahin Tajik 
250 |a 1st ed. 2019 
260 |a Cham  |b Springer International Publishing  |c 2019, 2019 
300 |a XX, 79 p. 36 illus., 24 illus. in color  |b online resource 
505 0 |a Introduction -- Background -- Experimental Setup -- Photonic Side-Channel Analysis -- Laser Fault Injection -- Optical Contactless Probing -- Conclusion 
653 |a Microprogramming  
653 |a Security Science and Technology 
653 |a Security systems 
653 |a Control Structures and Microprogramming 
653 |a Electronic circuits 
653 |a Signal, Speech and Image Processing 
653 |a Electronic Circuits and Systems 
653 |a Signal processing 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a T-Labs Series in Telecommunication Services 
028 5 0 |a 10.1007/978-3-319-75820-6 
856 4 0 |u https://doi.org/10.1007/978-3-319-75820-6?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.3815 
520 |a This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs’ security-related shortcomings and make them resistant to optical side-channeland optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts