A Survey On The Susceptibility Of PUFs To Invasive, Semi-Invasive And Noninvasive Attacks Challenges And Opportunities For Future Directions
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a hardware root-of-trust for integrated circuit (IC) applications. PUFs exploit the intrinsic process variations that map a set of challenges to a set of responses. The intrinsic process variations are ca...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | en |
| Published: |
World Scientific
2021
|
| Online Access: | http://eprints.utem.edu.my/id/eprint/25664/2/2021_A%20SURVEY%20ON%20THE%20SUSCEPTIBILITY%20OF%20PUFS%20TO%20INVASIVE%2C%20SEMI-INVASIVE%20AND%20NONINVASIVE%20ATTACKS%20CHALLENGES%20AND%20OPPORTUNITIES%20FOR%20FUTURE%20DIRECTIONS.PDF http://eprints.utem.edu.my/id/eprint/25664/ https://www.worldscientific.com/doi/10.1142/S0218126621300099 https://doi.org/10.1142/S0218126621300099 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a hardware root-of-trust for integrated circuit (IC) applications. PUFs exploit the intrinsic
process variations that map a set of challenges to a set of responses. The intrinsic process variations are caused by uncontrollable deviations in the IC manufacturing process, which are unique and random from die to die and wafer to wafer. As the PUF output is device-speci¯c, PUFs can, therefore, be used in IC identi¯cation and authentication, and cryptographic key generation. Nevertheless, many di®erent successful attack techniques have already revealed vulnerabilities in certain PUFs, including invasive, semi-invasive and noninvasive attacks. In this work, we survey some of the known attacks on PUFs. We also survey the countermeasures
to these types of attack presented in recent literature, and ¯nally, discuss the future challenges. Through this survey, the susceptibility of PUFs to attacks is highlighted and this information may be used to improve the quality of future PUF-based application designs |
|---|
