|
|
|
|
LEADER |
02126 am a22002053u 4500 |
001 |
100005 |
042 |
|
|
|a dc
|
100 |
1 |
0 |
|a Yu, Meng-Day
|e author
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
|e contributor
|
100 |
1 |
0 |
|a Devadas, Srinivas
|e contributor
|
700 |
1 |
0 |
|a M'Raihi, David
|e author
|
700 |
1 |
0 |
|a Verbauwhede, Ingrid
|e author
|
700 |
1 |
0 |
|a Devadas, Srinivas
|e author
|
245 |
0 |
0 |
|a A noise bifurcation architecture for linear additive physical functions
|
260 |
|
|
|b Institute of Electrical and Electronics Engineers (IEEE),
|c 2015-11-23T17:24:18Z.
|
856 |
|
|
|z Get fulltext
|u http://hdl.handle.net/1721.1/100005
|
520 |
|
|
|a Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. Popular realizations use linear additive functions as building blocks. Security is scaled up using non-linear mixing (e.g., adding XORs). Because the responses are physically derived and thus noisy, the resulting explosion in noise impacts both the adversary (which is desirable) as well as the verifier (which is undesirable). We present the first architecture for linear additive physical functions where the noise seen by the adversary and the noise seen by the verifier are bifurcated by using a randomized decimation technique and a novel response recovery method at an authentication verification server. We allow the adversary's noise η[subscript a] → 0.50 while keeping the verifier's noise η[subscript v] constant, using a parameter-based authentication modality that does not require explicit challenge/response pair storage at the server. We present supporting data using 28nm FPGA PUF noise results as well as machine learning attack results. We demonstrate that our architecture can also withstand recent side-channel attacks that filter the noise (to clean up training challenge/response labels) prior to machine learning.
|
546 |
|
|
|a en_US
|
655 |
7 |
|
|a Article
|
773 |
|
|
|t Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
|