Physically Unclonable Functions (PUFs): Applications, Models, and Future Directi (Synthesis Lectures on Information Security, Privacy, and Tru)
暫譯: 物理不可克隆函數 (PUFs):應用、模型與未來方向 (資訊安全、隱私與信任綜合講座)

Christian Wachsmann, Ahmad-Reza Sadeghi

  • 出版商: Morgan & Claypool
  • 出版日期: 2014-12-01
  • 售價: $1,440
  • 貴賓價: 9.5$1,368
  • 語言: 英文
  • 頁數: 92
  • 裝訂: Paperback
  • ISBN: 1627055096
  • ISBN-13: 9781627055093
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly used to produce and process both security-critical and privacy-sensitive data, which bear many security and privacy risks. Establishing trust in the underlying devices and making them resistant to software and hardware attacks is a fundamental requirement in many applications and a challenging, yet unsolved, task. Solutions solely based on software can never ensure their own integrity and trustworthiness while resource-constraints and economic factors often prevent the integration of sophisticated security hardware and cryptographic co-processors. In this context, Physically Unclonable Functions (PUFs) are an emerging and promising technology to establish trust in embedded systems with minimal hardware requirements.

This book explores the design of trusted embedded systems based on PUFs. Specifically, it focuses on the integration of PUFs into secure and efficient cryptographic protocols that are suitable for a variety of embedded systems. It exemplarily discusses how PUFs can be integrated into lightweight device authentication and attestation schemes, which are popular and highly relevant applications of PUFs in practice.

For the integration of PUFs into secure cryptographic systems, it is essential to have a clear view of their properties. This book gives an overview of different approaches to evaluate the properties of PUF implementations and presents the results of a large scale security analysis of different PUF types implemented in application-specific integrated circuits (ASICs). To analyze the security of PUF-based schemes as is common in modern cryptography, it is necessary to have a security framework for PUFs and PUF-based systems. In this book, we give a flavor of the formal modeling of PUFs that is in its beginning and that is still undergoing further refinement in current research.

The objective of this book is to provide a comprehensive overview of the current state of secure PUF-based cryptographic system design and the related challenges and limitations.

Table of Contents: Preface / Introduction / Basics of Physically Unclonable Functions / Attacks on PUFs and PUF-based Systems / Advanced PUF Concepts / PUF Implementations and Evaluation / PUF-based Cryptographic Protocols / Security Model for PUF-based Systems / Conclusion / Terms and Abbreviations / Bibliography / Authors' Biographies

商品描述(中文翻譯)

今天,嵌入式系統被廣泛應用於許多安全關鍵的應用中,從訪問控制、電子票證、感測器和智能設備(例如可穿戴設備)到汽車應用和關鍵基礎設施。這些系統越來越多地用於生成和處理安全關鍵和隱私敏感的數據,這些數據存在許多安全和隱私風險。在許多應用中,建立對底層設備的信任並使其抵抗軟體和硬體攻擊是一項基本要求,這也是一項具有挑戰性但尚未解決的任務。僅基於軟體的解決方案永遠無法確保其自身的完整性和可信度,而資源限制和經濟因素往往阻礙了複雜安全硬體和加密協處理器的整合。在這個背景下,物理不可複製函數(Physically Unclonable Functions, PUFs)是一種新興且有前景的技術,能以最小的硬體需求在嵌入式系統中建立信任。

本書探討基於PUF的可信嵌入式系統的設計。具體而言,它專注於將PUF整合到適合各種嵌入式系統的安全和高效的加密協議中。書中舉例討論PUF如何整合到輕量級設備身份驗證和證明方案中,這些是PUF在實踐中流行且高度相關的應用。

為了將PUF整合到安全的加密系統中,清楚了解其特性至關重要。本書概述了評估PUF實現特性的不同方法,並呈現了在應用特定集成電路(ASIC)中實現的不同PUF類型的大規模安全分析結果。為了分析基於PUF的方案的安全性,這在現代加密學中是常見的,必須有一個針對PUF和基於PUF的系統的安全框架。在本書中,我們提供了PUF的正式建模的初步概念,這一領域仍在當前研究中進一步完善。

本書的目標是提供有關安全PUF基礎的加密系統設計的當前狀態及相關挑戰和限制的綜合概述。

目錄:前言 / 介紹 / 物理不可複製函數基礎 / 對PUF和基於PUF的系統的攻擊 / 進階PUF概念 / PUF實現與評估 / 基於PUF的加密協議 / 基於PUF的系統安全模型 / 結論 / 專有名詞與縮寫 / 參考文獻 / 作者簡介