首页> 外文会议>2014 Design, Automation amp; Test in Europe Conference and Exhibition >Key-recovery attacks on various RO PUF constructions via helper data manipulation
【24h】

Key-recovery attacks on various RO PUF constructions via helper data manipulation

机译:通过辅助数据操作对各种RO PUF结构进行密钥恢复攻击

获取原文
获取原文并翻译 | 示例

摘要

Physically Unclonable Functions (PUFs) are security primitives that exploit the unique manufacturing variations of an integrated circuit (IC). They are mainly used to generate secret keys. Ring oscillator (RO) PUFs are among the most widely researched PUFs. In this work, we claim various RO PUF constructions to be vulnerable against manipulation of their public helper data. Partial/full key-recovery is a threat for the following constructions, in chronological order. (1) Temperature-aware cooperative RO PUFs, proposed at HOST 2009. (2) The sequential pairing algorithm, proposed at HOST 2010. (3) Group-based RO PUFs, proposed at DATE 2013. (4) Or more general, all entropy distiller constructions proposed at DAC 2013.
机译:物理上不可克隆的功能(PUF)是利用集成电路(IC)独特制造变化的安全原语。它们主要用于生成密钥。环形振荡器(RO)PUF是研究最广泛的PUF之一。在这项工作中,我们声称各种RO PUF构造容易受到操纵其公共帮助数据的攻击。按时间顺序,部分/完全密钥恢复对于以下构造会构成威胁。 (1)在HOST 2009上提出的具有温度感知能力的协作RO PUFs。(2)在HOST 2010上提出的顺序配对算法。(3)在2013年DATE提出的基于组的RO PUFs。(4)或更笼统地说,所有DAC 2013提出的熵蒸馏器构造。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号