Delay PUF assessment method based on side-channel and modeling analyzes: The final piece of all-in-one assessment methodology

Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Most of the recent literature investigates mathematical analyses performed on the simulated behavior of the delay physically unclonable function (PUF). These analyses are not sufficient to characterize the PUF leakage under actual operating conditions, and it is hard to model the distribution of the noise that might confuse the assessment of the PUF. Furthermore, simulated analyses may lead to an overestimation of the risk. We show that the availability of an embedded image of the target PUF is important for assessing security against real attacks by considering different input conditions. In this paper, we propose a delay PUF assessment method that combines side-channel analyses and modeling analyses. Our proposed method is the last piece of the all-in-one methodology to assess the security of the delay PUF. Finally, we conduct an experiment to evaluate a real arbiter-PUF (APUF) with our proposed assessment method. Our result shows that a modeling analysis using random forest (RF) and advanced support vector machine (SVM) are suitable for the APUF in the assessment method.

Original languageEnglish
Title of host publicationProceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages201-207
Number of pages7
ISBN (Electronic)9781509032051
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes
EventJoint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016 - Tianjin, China
Duration: 23 Aug 201626 Aug 2016

Publication series

NameProceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016

Conference

ConferenceJoint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
Country/TerritoryChina
CityTianjin
Period23/08/1626/08/16

Fingerprint

Dive into the research topics of 'Delay PUF assessment method based on side-channel and modeling analyzes: The final piece of all-in-one assessment methodology'. Together they form a unique fingerprint.

Cite this