datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register

Conquering Copycats: Attacks Fail Against Hardware Intrinsic Security

Authored on: Aug 26, 2009 by Pim Tuyls and John Walker

Technical Paper

0 0
More InfoLess Info

Concerns about hardware security have increased with the wide availability of sophisticated tools and invasive techniques to discover the secrets and keys that traditionally protect devices from counterfeiting, tampering and theft-of-service. With both revenues and reputation at stake, a new approach to hardware security that does not depend on a stored key is necessary. Hardware intrinsic security (HIS), based on inherent, device-unique properties, provides secret key storage without storing a key. Using physically unclonable functions (PUFs), HIS systems exploit intrinsic deep-submicron process variations to authenticate, configure and/or monitor the production of electronic devices. An independent lab, SiVenture, performed several experiments, including voltage contrast attacks using a scanning electronic microscope (SEM) and a focused ion beam (FIB), designed to discover the secret key in an SRAM PUF used in an HIS system from Intrinsic-ID. These experiments confirmed that invasive attacks fail against the HIS approach, where no key is stored within the device.



Please disable any pop-up blockers for proper viewing of this paper.

0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page