TY - GEN
T1 - Delay PUF assessment method based on side-channel and modeling analyzes
T2 - Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
AU - Fukushima, Kazuhide
AU - Souissi, Youssef
AU - Hidano, Seira
AU - Nguyen, Robert
AU - Danger, Jean Luc
AU - Guilley, Sylvain
AU - Nakano, Yuto
AU - Kiyomoto, Shinsaku
AU - Sauvage, Laurent
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/1/1
Y1 - 2016/1/1
N2 - Most of the recent literature investigates mathematical analyses performed on the simulated behavior of the delay physically unclonable function (PUF). These analyses are not sufficient to characterize the PUF leakage under actual operating conditions, and it is hard to model the distribution of the noise that might confuse the assessment of the PUF. Furthermore, simulated analyses may lead to an overestimation of the risk. We show that the availability of an embedded image of the target PUF is important for assessing security against real attacks by considering different input conditions. In this paper, we propose a delay PUF assessment method that combines side-channel analyses and modeling analyses. Our proposed method is the last piece of the all-in-one methodology to assess the security of the delay PUF. Finally, we conduct an experiment to evaluate a real arbiter-PUF (APUF) with our proposed assessment method. Our result shows that a modeling analysis using random forest (RF) and advanced support vector machine (SVM) are suitable for the APUF in the assessment method.
AB - Most of the recent literature investigates mathematical analyses performed on the simulated behavior of the delay physically unclonable function (PUF). These analyses are not sufficient to characterize the PUF leakage under actual operating conditions, and it is hard to model the distribution of the noise that might confuse the assessment of the PUF. Furthermore, simulated analyses may lead to an overestimation of the risk. We show that the availability of an embedded image of the target PUF is important for assessing security against real attacks by considering different input conditions. In this paper, we propose a delay PUF assessment method that combines side-channel analyses and modeling analyses. Our proposed method is the last piece of the all-in-one methodology to assess the security of the delay PUF. Finally, we conduct an experiment to evaluate a real arbiter-PUF (APUF) with our proposed assessment method. Our result shows that a modeling analysis using random forest (RF) and advanced support vector machine (SVM) are suitable for the APUF in the assessment method.
U2 - 10.1109/TrustCom.2016.0064
DO - 10.1109/TrustCom.2016.0064
M3 - Conference contribution
AN - SCOPUS:85015157892
T3 - Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
SP - 201
EP - 207
BT - Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 23 August 2016 through 26 August 2016
ER -