PUF Modeling Attacks on Simulated and Silicon Data

Provided by: Institute of Electrical & Electronic Engineers
Topic: Security
Format: PDF
The authors discuss numerical modeling attacks on several proposed strong Physical Unclonable Functions (PUFs). Given a set of Challenge-Response Pairs (CRPs) of a strong PUF, the goal of their attacks is to construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. If successful, this algorithm can subsequently impersonate the strong PUF, and can be cloned and distributed arbitrarily. It breaks the security of any applications that rest on the strong PUF's unpredictability and physical unclonability.

Find By Topic