{"title":"Side-Channel Resistance Evaluation Method using Statistical Tests for Physical Unclonable Function","authors":"Y. Nozaki, M. Yoshikawa","doi":"10.1109/ICAIIC.2019.8669053","DOIUrl":null,"url":null,"abstract":"To obtain the internet of things (IoT) security, physical unclonable functions (PUFs) have attracted attention. Regarding hardware security, in recent years, the risk of side-channel attacks (SCAs) for PUF is pointed out. Therefore, countermeasures against SCAs have been proposed, and field programmable gate array (FPGA) implementation evaluations have also been reported. On the other hand, the evaluation of PUFs with countermeasures needs actual modeling attacks using many side-channel information; therefore, costs increase. This study proposes a new PUF security evaluation method, which does not need actual modeling attacks. The proposed method verifies the existence of side-channel leakages by applying statistical tests to measured power consumption waveforms during PUF operations. In experiments using an FPGA, by using the proposed method, it was confirmed that there were significant differences in the PUF without countermeasure. Experiments also showed that significant differences did not appear in the PUF with countermeasure and the proposed method could evaluate the PUF security easily without actual modeling attacks.","PeriodicalId":273383,"journal":{"name":"2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIIC.2019.8669053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
To obtain the internet of things (IoT) security, physical unclonable functions (PUFs) have attracted attention. Regarding hardware security, in recent years, the risk of side-channel attacks (SCAs) for PUF is pointed out. Therefore, countermeasures against SCAs have been proposed, and field programmable gate array (FPGA) implementation evaluations have also been reported. On the other hand, the evaluation of PUFs with countermeasures needs actual modeling attacks using many side-channel information; therefore, costs increase. This study proposes a new PUF security evaluation method, which does not need actual modeling attacks. The proposed method verifies the existence of side-channel leakages by applying statistical tests to measured power consumption waveforms during PUF operations. In experiments using an FPGA, by using the proposed method, it was confirmed that there were significant differences in the PUF without countermeasure. Experiments also showed that significant differences did not appear in the PUF with countermeasure and the proposed method could evaluate the PUF security easily without actual modeling attacks.