Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks
2014 (English)In: INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 241-255 p.Conference paper (Refereed)
One of the most common types of Physical Unclonable Functions (PUFs) is the ring oscillator PUF (RO-PUF), a type of PUF in which the output bits are obtained by comparing the oscillation frequencies of different ring oscillators. One application of RO-PUFs is to be used as strong PUFs: a reader sends a challenge to the RO-PUF and the RO-PUF's response is compared with an expected response to authenticate the PUF. In this work we introduce a method to choose challenge-response pairs so that a high number of challenge-response pairs is provided but the system has a good tolerance to modeling attacks, a type of attacks in which an attacker guesses the response to a new challenge by using his knowledge about the previously-exchanged challenge-response pairs. Our method targets tag-constrained applications, i. e. applications in which there are strong limitations of cost, area and power on the system in which the PUF has to be implemented.
Place, publisher, year, edition, pages
2014. 241-255 p.
, Lecture Notes in Computer Science, ISSN 0302-9743 ; 8565
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:kth:diva-158851DOI: 10.1007/978-3-319-12160-4_15ISI: 000345114800015ScopusID: 2-s2.0-84911145312ISBN: 978-3-319-12160-4; 978-3-319-12159-8OAI: oai:DiVA.org:kth-158851DiVA: diva2:781122
16th International Conference on Information Security and Cryptology (ICISC), NOV 27-29, 2013, Seoul, SOUTH KOREA
QC 201501152015-01-152015-01-122015-01-15Bibliographically approved