Attacks and Countermeasures for Capacitive PUF-Based Security Enclosures

被引:0
|
作者
Garb, Kathrin [1 ]
Schink, Marc [1 ]
Hiller, Matthias [1 ]
Obermaier, Johannes [1 ]
机构
[1] Fraunhofer Inst AISEC, Garching, Germany
关键词
capacitive enclosure; Physical Unclonable Function; bypassing; micro drilling; magnetic probing; SIDE-CHANNEL;
D O I
10.1109/PAINE54418.2021.9707704
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Protecting embedded devices from tampering is a difficult task since the attacker can perform manipulations through physical access. To provide a security barrier for protection, envelopes based on Physical Unclonable Functions (PUFs) have been developed. Their PUF emerges from, for example, a mesh of electrical capacitors embedded in the envelope. Even though these envelopes have several advantages over existing battery-backed solutions, it has been shown that they are susceptible to micro-drilling and bypassing attacks, where the capacitances and thereby the PUF secret can be extracted unnoticed. We harden the security of the capacitive PUF-based enclosure by presenting the three most impactful hardware attacks and proposing practical countermeasures for micro drilling, bypassing, and magnetic probing. We analyze the impact of drilling attacks with small diameters << 300 mu m, and discuss additional countermeasures. We also propose a hardware countermeasure for the previously published bypassing attack. Furthermore, we conduct an H-probe attack on the magnetic field permeating the envelope's shielding where we show, in practice as well as through Finite Element Analysis (FEA), that intercepting the transmission of digitized PUF-responses is practically feasible. As a countermeasure, we extend our PUF evaluation system by cryptographic security measures to ensure confidentiality. Our discussion of attacks and the development of countermeasures brings PUF-based security enclosures an important step forward towards their practical applications in the next generation of high security systems.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Cyber Security Protocol for Secure Traffic Monitoring Systems using PUF-based Key Management
    Pudi, Vikramkumar
    Bodapati, Srinivasu
    Kumar, Sachin
    Chattopadhyay, Anupam
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 103 - 108
  • [42] Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications
    Devadas, Srinivas
    Suh, Edward
    Paral, Sid
    Sowell, Richard
    Ziola, Tom
    Khandelwal, Vivek
    2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, : 58 - +
  • [43] PUFchain 4.0: Integrating PUF-based TPM in Distributed Ledger for Security-by-Design of IoT
    Bathalapalli, Venkata K. V. V.
    Mohanty, Saraju P.
    Kougianos, Elias
    Iyer, Vasanth
    Rout, Bibhudutta
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 231 - 236
  • [44] On Designing PUF-Based TRNGs with Known Answer Tests
    Yu, Yang
    Dubrova, Elena
    Naslund, Mats
    Tao, Sha
    2018 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE (NORCAS): NORCHIP AND INTERNATIONAL SYMPOSIUM OF SYSTEM-ON-CHIP (SOC), 2018,
  • [45] PUF-based Secure Test Wrapper for SoC Testing
    Kumar, Sudeendra K.
    Seth, Saurabh
    Sahoo, Sauvagya
    Mahapatra, Abhishek
    Swain, Ayas Kanta
    Mahapatra, K. K.
    2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 672 - 677
  • [46] A PUF-based Mutual Authentication Protocol for Internet of Things
    Satamraju, Krishna Prasad
    Malarkodi, B.
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [47] PUF-IPA: A PUF-based Identity Preserving Protocol for Internet of Things Authentication
    Qureshi, Mahmood Azhar
    Munir, Arslan
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [48] A CANVASS ON CYBER SECURITY ATTACKS AND COUNTERMEASURES
    Gupta, Shubhi
    Vashisht, Swati
    Singh, Divya
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 31 - 35
  • [49] NBTI Aging Evaluation of PUF-based Differential Architectures
    Mispan, Mohd Syafiq
    Halak, Basel
    Zwolinski, Mark
    2016 IEEE 22ND INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2016, : 103 - 108
  • [50] On Designing PUF-Based TRNGs with Known Answer Tests
    Yu, Yang
    Dubrova, Elena
    Naslund, Mats
    Tao, Sha
    2018 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE (NORCAS): NORCHIP AND INTERNATIONAL SYMPOSIUM OF SYSTEM-ON-CHIP (SOC), 2018,