Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient Helper Data Key Extractor on FPGAs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Lest we remember: cold-boot attacks on encryption keys
Communications of the ACM - Security in the Browser
Extended abstract: The butterfly PUF protecting IP on every FPGA
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
IEEE Transactions on Computers
Hardware intrinsic security from D flip-flops
Proceedings of the fifth ACM workshop on Scalable trusted computing
Ending Piracy of Integrated Circuits
Computer
Extracting secret keys from integrated circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Side-channel analysis of PUFs and fuzzy extractors
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
A practical device authentication scheme using SRAM PUFs
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Logically reconfigurable PUFs: memory-based secure key storage
Proceedings of the sixth ACM workshop on Scalable trusted computing
RFID-Tags for anti-counterfeiting
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A novel RFID distance bounding protocol based on physically unclonable functions
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Evaluation of a PUF device authentication scheme on a discrete 0.13um SRAM
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Algebraic side-channel attacks beyond the hamming weight leakage model
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
DRV-Fingerprinting: using data retention voltage of SRAM cells for chip identification
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Hi-index | 0.00 |
We present a side-channel attack based on remanence decay in volatile memory and show how it can be exploited effectively to launch a non-invasive cloning attack against SRAM PUFs -- an important class of PUFs typically proposed as lightweight security primitive with low overhead by using the existing memory of the underlying device. We validate our approach against two SRAM PUF implementations in 65 nm CMOS ASICs. We discuss countermeasures against our attack and propose the constructive use of remanence decay to improve the cloning-resistance of SRAM PUFs. Moreover, as a further contribution of independent interest, we show how to use our evaluation results to significantly improve the performance of the recently proposed TARDIS scheme, which is based on remanence decay in SRAM and used as a time-keeping mechanism for low-power clock-less devices.