About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Industrial Networks and Intelligent Systems. 7th EAI International Conference, INISCOM 2021, Hanoi, Vietnam, April 22-23, 2021, Proceedings

Research Article

Highly Reliable PUFs for Embedded Systems, Protected Against Tampering

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-77424-0_14,
        author={Jean-Luc Danger and Sylvain Guilley and Michael Pehl and Sophiane Senni and Youssef Souissi},
        title={Highly Reliable PUFs for Embedded Systems, Protected Against Tampering},
        proceedings={Industrial Networks and Intelligent Systems. 7th EAI International Conference, INISCOM 2021, Hanoi, Vietnam, April 22-23, 2021, Proceedings},
        proceedings_a={INISCOM},
        year={2021},
        month={5},
        keywords={Physically Unclonable Function (PUF) Loop PUF Internet-of-Things (IoT) Dependability Anti-copy Root-of-Trust Tamper-Proof},
        doi={10.1007/978-3-030-77424-0_14}
    }
    
  • Jean-Luc Danger
    Sylvain Guilley
    Michael Pehl
    Sophiane Senni
    Youssef Souissi
    Year: 2021
    Highly Reliable PUFs for Embedded Systems, Protected Against Tampering
    INISCOM
    Springer
    DOI: 10.1007/978-3-030-77424-0_14
Jean-Luc Danger1,*, Sylvain Guilley1, Michael Pehl2, Sophiane Senni3, Youssef Souissi3
  • 1: LTCI, Télécom Paris
  • 2: Department of Electrical and Computer Engineering, Chair of Security in Information Technology
  • 3: Secure-IC S.A.S., Tour Montparnasse, 33 avenue du Maine
*Contact email: jean-luc.danger@telecom-paris.fr

Abstract

Physically Unclonable Functions (PUFs) are well-known to be solutions for silicon-level anti-copy applications. However, as they are sensitive components, they are the obvious target of physical attacks. Thus, they shall be well protected. In this work we discuss the use case of key generation with a Loop PUF. We discuss the Loop PUF’s efficiency and efficacy. We analyze it with respect to several known attacks like side-channel and machine learning attacks, and show that in all considered cases it either natively resists or can be protected. We also show that perturbation attempts should be within the scope of likely attacks, hence the PUF shall be protected against tampering attacks as well. Also for this attack scenario we highlight the salient features of the Loop PUF and explain how its mode of operation natively empowers it to resist such attacks.

Keywords
Physically Unclonable Function (PUF) Loop PUF Internet-of-Things (IoT) Dependability Anti-copy Root-of-Trust Tamper-Proof
Published
2021-05-28
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-77424-0_14
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL