Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices

Xinhui Lai, Maksim Jenihhin, Georgios Selimis, Sven Goossens, Roel Maes, Kolin Paul

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

Physical Unclonable Functions (PUFs) are gaining attention in the cryptography community because of the ability to efficiently harness the intrinsic variability in the manufacturing process. However, this means that they are noisy devices and require error correction mechanisms, e.g., by employing Fuzzy Extractors (FEs). Recent works demonstrated that applying FEs for error correction may enable new opportunities to break the PUFs if no countermeasures are taken. In this paper, we address an attack model on FEs hardware implementations and provide a solution for early identification of the timing Side-Channel Attack (SCA) vulnerabilities which can be exploited by physical fault injection. The significance of this work stems from the fact that FEs are an essential building block in the implementations of PUF-enabled devices. The information leaked through the timing side-channel during the error correction process can reveal the FE input data and thereby can endanger revealing secrets. Therefore, it is very important to identify the potential leakages early in the process during RTL design. Experimental results based on RTL analysis of several Bose-Chaudhuri-Hocquenghem (BCH) and Reed-Solomon decoders for PUF-enabled devices with FEs demonstrate the feasibility of the proposed methodology.
Original languageEnglish
Title of host publication2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration, VLSI-SOC 2020
PublisherInstitute of Electrical and Electronics Engineers
Pages16-21
Number of pages6
ISBN (Electronic)978-1-7281-5409-1
DOIs
Publication statusPublished - 10 Feb 2021
Externally publishedYes
Event2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC) - Salt Lake City, United States
Duration: 5 Oct 20207 Oct 2020

Conference

Conference2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC)
Country/TerritoryUnited States
CitySalt Lake City
Period5/10/207/10/20

Keywords

  • Reed-Solomon codes
  • Side-channel attacks
  • Very large scale integration
  • Physical unclonable function
  • Iron
  • Timing
  • Error correction

Fingerprint

Dive into the research topics of 'Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices'. Together they form a unique fingerprint.

Cite this