Paper 2019/1260
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
Anita Aghaie and Amir Moradi
Abstract
One of the main motivations behind introducing PUFs was their ability to resist physical attacks. Among them, cloning was the major concern of related scientific literature. Several primitive PUF designs have been introduced to the community, and several machine learning attacks have been shown capable to model such constructions. Although a few works have expressed how to make use of Side-Channel Analysis (SCA) leakage of PUF constructions to significantly improve the modeling attacks, little attention has been payed to provide corresponding countermeasures. In this paper, we present a generic technique to operate any PUF primitive in an SCA-secure fashion. We, for the first time, make it possible to apply a provably-secure masking countermeasure – Threshold Implementation (TI) – on a strong PUF design. As a case study, we concentrate on the Interpose PUF, and based on practical experiments on an FPGA prototype, we demonstrate the ability of our construction to prevent the recovery of intermediate values through SCA measurements.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. IEEE Transactions on Information Forensics and Security
- DOI
- 10.1109/TIFS.2020.2986887
- Keywords
- side-channel analysisSCAPhysical Unclonable FunctionPUF
- Contact author(s)
- amir moradi @ rub de
- History
- 2020-04-11: revised
- 2019-11-05: received
- See all versions
- Short URL
- https://ia.cr/2019/1260
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/1260, author = {Anita Aghaie and Amir Moradi}, title = {{TI}-{PUF}: Toward Side-Channel Resistant Physical Unclonable Functions}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/1260}, year = {2019}, doi = {10.1109/TIFS.2020.2986887}, url = {https://eprint.iacr.org/2019/1260} }