Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks
KTH, School of Information and Communication Technology (ICT), Electronic Systems.
KTH, School of Information and Communication Technology (ICT), Electronic Systems.ORCID iD: 0000-0001-7382-9408
2014 (English)In: INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 241-255 p.Conference paper, Published paper (Refereed)
Abstract [en]

One of the most common types of Physical Unclonable Functions (PUFs) is the ring oscillator PUF (RO-PUF), a type of PUF in which the output bits are obtained by comparing the oscillation frequencies of different ring oscillators. One application of RO-PUFs is to be used as strong PUFs: a reader sends a challenge to the RO-PUF and the RO-PUF's response is compared with an expected response to authenticate the PUF. In this work we introduce a method to choose challenge-response pairs so that a high number of challenge-response pairs is provided but the system has a good tolerance to modeling attacks, a type of attacks in which an attacker guesses the response to a new challenge by using his knowledge about the previously-exchanged challenge-response pairs. Our method targets tag-constrained applications, i. e. applications in which there are strong limitations of cost, area and power on the system in which the PUF has to be implemented.

Place, publisher, year, edition, pages
2014. 241-255 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 8565
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-158851DOI: 10.1007/978-3-319-12160-4_15ISI: 000345114800015Scopus ID: 2-s2.0-84911145312ISBN: 978-3-319-12160-4; 978-3-319-12159-8 (print)OAI: oai:DiVA.org:kth-158851DiVA: diva2:781122
Conference
16th International Conference on Information Security and Cryptology (ICISC), NOV 27-29, 2013, Seoul, SOUTH KOREA
Note

QC 20150115

Available from: 2015-01-15 Created: 2015-01-12 Last updated: 2015-01-15Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Authority records BETA

Dubrova, Elena

Search in DiVA

By author/editor
Mansouri, Shohreh SharifDubrova, Elena
By organisation
Electronic Systems
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 26 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf