Invasive PUF Analysis

In this work we consider the suitability of Phyiscaly Unclonable Functions (PUFs) for high-security applications. For PUFs to be considered secure in such scenarios they must be resilient to both semi-invasive and fully-invasive attacks. We introduce a new failure analysis technique for semi-invasive, single-trace, backside readout of logic states. We apply this technique to characterize the unique physical response of a memory-based PUF. With these results we identify several weakness in current PUF schemes. We extend current PUF definitions to be resilient against such attacks by requiring that PUFs be implemented in a serialized manner. Finally, we improve already existing PUF architectures to include these concepts.

[1]  Stefan Katzenbeisser,et al.  PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon , 2012, CHES.

[2]  C. Boit,et al.  Systematic Characterization of Integrated Circuit Standard Components as Stimulated by Scanning Laser Beam , 2007, IEEE Transactions on Device and Materials Reliability.

[3]  Philippe Perdu,et al.  Implementing Thermal Laser and Photoelectric Laser Stimulation in a failure analysis laboratory , 2003, Proceedings of the 10th International Symposium on the Physical and Failure Analysis of Integrated Circuits. IPFA 2003.

[4]  Jasper G. J. van Woudenberg,et al.  Practical Optical Fault Injection on Secure Microcontrollers , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[5]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[6]  Ying Su,et al.  A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations , 2008, IEEE Journal of Solid-State Circuits.

[7]  Ross J. Anderson,et al.  On a new way to read data from memory , 2002, First International IEEE Security in Storage Workshop, 2002. Proceedings..

[8]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[9]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[10]  David Evans,et al.  Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.

[11]  F. H. Köklü,et al.  Widefield Subsurface Microscopy of Integrated Circuits , 2008 .

[12]  Srinivas Devadas,et al.  Modeling attacks on physical unclonable functions , 2010, CCS '10.

[13]  Wolfgang Rankl,et al.  Smart Card Handbook: Rankl/Smart Card Handbook , 2010 .

[14]  T. Geballe,et al.  Seebeck Effect in Silicon , 1955 .

[15]  Rainer Plaga,et al.  A Formal Definition and a New Security Mechanism of Physical Unclonable Functions , 2012, MMB/DFT.

[17]  Frederik Armknecht,et al.  A Formalization of the Security Features of Physical Functions , 2011, 2011 IEEE Symposium on Security and Privacy.

[18]  Frank Sehnke,et al.  On the Foundations of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..

[19]  David Naccache,et al.  Towards Hardware-Intrinsic Security - Foundations and Practice , 2010, Information Security and Cryptography.

[20]  Christophe Goupil,et al.  Thermodynamics of Thermoelectric Phenomena and Applications , 2011, Entropy.

[21]  Boris Skoric,et al.  Read-Proof Hardware from Protective Coatings , 2006, CHES.

[22]  Sergei P. Skorobogatov Optically Enhanced Position-Locked Power Analysis , 2006, CHES.