@inproceedings{cadae710ad3b4668b049042ce2b09b42,
title = "Side-channel analysis of PUFs and fuzzy extractors",
abstract = "Embedded security systems based on Physical Unclonable Functions (PUFs) offer interesting protection properties, such as tamper resistance and unclonability. However, to establish PUFs as a high security primitive in the long run, their vulnerability to side-channel attacks has to be investigated. For this purpose, we analysed the side-channel leakage of PUF architectures and fuzzy extractor implementations. We identified several attack vectors within common PUF constructions and introduce two side-channel attacks on fuzzy extractors. Our proof-of-concept attack on an FPGA implementation of a fuzzy extractor shows that it is possible to extract the cryptographic key derived from a PUF by side-channel analysis.",
keywords = "FPGA, Fuzzy Extractor, Helper Data, Physical Unclonable Function (PUF), Side-Channel Analysis (SCA)",
author = "Dominik Merli and Dieter Schuster and Frederic Stumpf and Georg Sigl",
year = "2011",
doi = "10.1007/978-3-642-21599-5_3",
language = "English",
isbn = "9783642215988",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "33--47",
booktitle = "Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings",
}