000 03472nam a22005655i 4500
001 978-3-319-75820-6
003 DE-He213
005 20220801220451.0
007 cr nn 008mamaa
008 180327s2019 sz | s |||| 0|eng d
020 _a9783319758206
_9978-3-319-75820-6
024 7 _a10.1007/978-3-319-75820-6
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aTajik, Shahin.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_950471
245 1 0 _aOn the Physical Security of Physically Unclonable Functions
_h[electronic resource] /
_cby Shahin Tajik.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXX, 79 p. 36 illus., 24 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aT-Labs Series in Telecommunication Services,
_x2192-2829
505 0 _aIntroduction -- Background -- Experimental Setup -- Photonic Side-Channel Analysis -- Laser Fault Injection -- Optical Contactless Probing -- Conclusion.
520 _aThis book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs’ security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.
650 0 _aElectronic circuits.
_919581
650 0 _aSecurity systems.
_931879
650 0 _aMicroprogramming .
_932081
650 0 _aSignal processing.
_94052
650 1 4 _aElectronic Circuits and Systems.
_950472
650 2 4 _aSecurity Science and Technology.
_931884
650 2 4 _aControl Structures and Microprogramming.
_932083
650 2 4 _aSignal, Speech and Image Processing .
_931566
710 2 _aSpringerLink (Online service)
_950473
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319758190
776 0 8 _iPrinted edition:
_z9783319758213
776 0 8 _iPrinted edition:
_z9783030093334
830 0 _aT-Labs Series in Telecommunication Services,
_x2192-2829
_950474
856 4 0 _uhttps://doi.org/10.1007/978-3-319-75820-6
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78598
_d78598