On the Physical Security of Physically Unclonable Functions (T-Labs Series in Telecommunication Services)
暫譯: 物理不可複製函數的物理安全性(T-Labs電信服務系列)

Shahin Tajik

相關主題

商品描述

This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs’ security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.

商品描述(中文翻譯)

本書探討了可重構硬體上內在物理不可複製功能(PUF)實現對來自晶片背面的光學半侵入式攻擊的脆弱性。它探索了不同類別的光學攻擊,特別是光子發射分析、激光故障注入和光學非接觸探測。通過應用這些技術,本書展示了PUF生成的秘密可以被預測、操控或直接探測,而不影響PUF的行為。隨後,書中討論了在真實場景中對最新硬體技術發起此類攻擊的成本和可行性。作者討論了為什麼PUF在當前配置下並不具備防篡改的特性,因此僅依賴PUF無法提高金鑰儲存的安全性。接著,作者回顧了潛在的和已實施的對策,這些對策可以彌補PUF在安全性方面的不足,使其能抵抗光學側信道和光學故障攻擊。最後,通過對現有PUF架構的功能進行選定的修改,本書提出了一個原型防篡改傳感器,用於檢測光學非接觸探測嘗試。