語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
On the physical security of physical...
~
SpringerLink (Online service)
On the physical security of physically unclonable functions
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
On the physical security of physically unclonable functionsby Shahin Tajik.
作者:
Tajik, Shahin.
出版者:
Cham :Springer International Publishing :2019.
面頁冊數:
xx, 79 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer security.
電子資源:
http://dx.doi.org/10.1007/978-3-319-75820-6
ISBN:
9783319758206
On the physical security of physically unclonable functions
Tajik, Shahin.
On the physical security of physically unclonable functions
[electronic resource] /by Shahin Tajik. - Cham :Springer International Publishing :2019. - xx, 79 p. :ill., digital ;24 cm. - T-labs series in telecommunication services,2192-2810. - T-labs series in telecommunication services..
Introduction -- Background -- Experimental Setup -- Photonic Side-Channel Analysis -- Laser Fault Injection -- Optical Contactless Probing -- Conclusion.
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs' security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.
ISBN: 9783319758206
Standard No.: 10.1007/978-3-319-75820-6doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
On the physical security of physically unclonable functions
LDR
:02377nmm a2200325 a 4500
001
549752
003
DE-He213
005
20180328023106.0
006
m d
007
cr nn 008maaau
008
190926s2019 gw s 0 eng d
020
$a
9783319758206
$q
(electronic bk.)
020
$a
9783319758190
$q
(paper)
024
7
$a
10.1007/978-3-319-75820-6
$2
doi
035
$a
978-3-319-75820-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
T135 2019
100
1
$a
Tajik, Shahin.
$3
829512
245
1 0
$a
On the physical security of physically unclonable functions
$h
[electronic resource] /
$c
by Shahin Tajik.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xx, 79 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
T-labs series in telecommunication services,
$x
2192-2810
505
0
$a
Introduction -- Background -- Experimental Setup -- Photonic Side-Channel Analysis -- Laser Fault Injection -- Optical Contactless Probing -- Conclusion.
520
$a
This book investigates the susceptibility of intrinsic physically unclonable function (PUF) implementations on reconfigurable hardware to optical semi-invasive attacks from the chip backside. It explores different classes of optical attacks, particularly photonic emission analysis, laser fault injection, and optical contactless probing. By applying these techniques, the book demonstrates that the secrets generated by a PUF can be predicted, manipulated or directly probed without affecting the behavior of the PUF. It subsequently discusses the cost and feasibility of launching such attacks against the very latest hardware technologies in a real scenario. The author discusses why PUFs are not tamper-evident in their current configuration, and therefore, PUFs alone cannot raise the security level of key storage. The author then reviews the potential and already implemented countermeasures, which can remedy PUFs' security-related shortcomings and make them resistant to optical side-channel and optical fault attacks. Lastly, by making selected modifications to the functionality of an existing PUF architecture, the book presents a prototype tamper-evident sensor for detecting optical contactless probing attempts.
650
0
$a
Computer security.
$3
184416
650
0
$a
Adaptive computing systems.
$3
299106
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Security Science and Technology.
$3
510148
650
2 4
$a
Control Structures and Microprogramming.
$3
274663
650
2 4
$a
Signal, Image and Speech Processing.
$3
273768
650
2 4
$a
Electronic Circuits and Devices.
$3
495609
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
T-labs series in telecommunication services.
$3
677055
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-75820-6
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000164168
電子館藏
1圖書
電子書
EB QA76.9.A25 T135 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-3-319-75820-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入