4.1.2 Characterization of Inverter-Based Arbiter PUF4.2 Results; 4.3 Discussion and Potential Countermeasures; 4.3.1 Feasibility of the Attack; 4.3.2 Photonic-Side Channel Attack Versus Modeling Attack; 4.3.3 Applicability of the Attack on Smaller Technologies; 4.3.4 Countermeasures; 5 Laser Fault Injection; 5.1 Attack Scenarios; 5.1.1 LFI Attack Against XOR Arbiter PUFs; 5.1.2 LFI Attack Against RO PUFs; 5.2 Results; 5.3 Discussion and Potential Countermeasures; 5.3.1 Scalability of the Attack; 5.3.2 Applicability of the Attack; 5.3.3 Countermeasures; 6 Optical Contactless Probing
Text of Note
6.1 Attack Scenario6.1.1 Key Extraction; 6.1.2 RO PUF Characterization; 6.2 Results; 6.2.1 Key Extraction; 6.2.2 RO Characterization; 6.3 Discussion; 6.3.1 Locating the Registers and IP Cores on the Chip; 6.3.2 Feasibility and Scalability of the Attack; 6.3.3 Tamper Evidence; 6.4 Potential Countermeasure; 6.4.1 Requirements for PUFs as Sensors; 6.4.2 Sensor Candidates; 6.4.3 Combining RO Sum PUFs and RONs; 6.4.4 Enrollment and Verification; 6.4.5 Monitoring of Optical Probing Attempts; 6.4.6 Strengths and Weaknesses of PUFMon; 7 Conclusion and Future Work; References
0
8
8
8
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783319758206
OTHER EDITION IN ANOTHER MEDIUM
Title
On the physical security of physically unclonable functions.