Special session: How secure are PUFs really? on the reach and limits of recent PUF attacks

Ulrich Rührmair, Ulf Schlichtmann, Wayne Burleson

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Just over a decade ago, Physical Unclonable Functions (PUFs) have been introduced as a new cryptographic and security primitive in a number of seminal publications. Due to their assumed security and cost advantages, they have attracted substantial attention both from the security industry and the academic community, and are also gaining ground in commercial applications. Nevertheless, a number of recent works have presented successful attacks on PUF core properties, such as their digital and physical unclonability. How strong and relevant are these attacks, and how secure are PUFs really? This question is addressed in a dedicated hot topic session at DATE 2014. This paper provides a short and easily accessible overview of the session.

Original languageEnglish
Title of host publicationProceedings - Design, Automation and Test in Europe, DATE 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9783981537024
DOIs
StatePublished - 2014
Event17th Design, Automation and Test in Europe, DATE 2014 - Dresden, Germany
Duration: 24 Mar 201428 Mar 2014

Publication series

NameProceedings -Design, Automation and Test in Europe, DATE
ISSN (Print)1530-1591

Conference

Conference17th Design, Automation and Test in Europe, DATE 2014
Country/TerritoryGermany
CityDresden
Period24/03/1428/03/14

Keywords

  • Invasive Attacks
  • Modeling Attacks
  • Physical Unclonable Functions (PUFs)
  • Protocol Attacks
  • Security
  • Side Channel Attacks
  • Strong PUFs
  • Weak PUFs

Fingerprint

Dive into the research topics of 'Special session: How secure are PUFs really? on the reach and limits of recent PUF attacks'. Together they form a unique fingerprint.

Cite this