Entropy
Ideally, PUFs should have 50% intra-Hamming distance. Ideally, TRNGs should have 50% intra-Hamming distance. Frequency injection attack on an oscillator-based TRNG reduces the throughput, but entropy remains the same.
Ideally, PUFs should have 50% intra-Hamming distance. Ideally, TRNGs should have 50% intra-Hamming distance. Frequency injection attack on an oscillator-based TRNG reduces the throughput, but entropy remains the same.
Depending on the startup behavior, the SRAM-array can be used both as a PUF and a TRNG. 1. Runtime variation (such as power supply noise and Vdd fluctuations) is good for PUFs, but unacceptable for TRNGs. 2. DfAC structures, such as CDIR sensors, utilize aging phenomena for detecting prior usages of the IC.
Power supply noise Read More »
Explain how you can increase the security of the response of a weak PUF (used for key generation) against possible guessing or side-channel attacks. 1. Briefly explain the major challenges that PUFs and TRNGs suffer.
Briefly explain the differences between a TRNG and a PRNG? Which one of them would you consider, if you were only interested in: (a) High entropy. (b) High speed. (c) Low runtime noise.
Consider two types of PUFs, namely “M” and “N”. Their intra- and inter-hamming distances are presented in Fig. 12.22. Explain which type of the two PUFs serves better for the following applications: (a) authentication, (b) key generation.
How potential vulnerabilities can be introduced by design mistakes? Show an example. 1. How potential vulnerabilities can be introduced by CAD tools? Show an example. 2. Describe the principle of the following tests: (i) Fuzzing, (ii) Negative Testing, (iii) Penetration Testing. 3. How does the “Hiding Mechanisms” protect against side-channel attacks?
Potential vulnerabilities Read More »
Describe the “Assets” that can be found in a SoC. 1. How can the entropy asset be exploited? 2. How can a scan-based attack be performed remotely? Show an example. 3. Explain the differences between semi-invasive and invasive attack. 4. Describe the capabilities of an “Insider” attacker. What kind of attacks can an “Insider” perform?
Random number can be an asset. Remote attackers cannot perform attacks exploiting scan structure. Injecting faults to modify SRAM contents is a semi-invasive attack. Side-channel attacks fall into invasive attack category. Vulnerabilities associated with don’t-care states are introduced in the RTL stage. Vulnerabilities associated with DFT structure are introduced in the gate-level stage.
In a semiconductor supply chain, what are the security and trust issues in an untrusted design house from the IP vendor’s point of view? 1. List all possible security and trust issues in an IC supply chain when the design house sends the design for fabrication to an untrusted facility. 2. Why is encryption not
Protecting hardware Read More »
SAT attack directly finds the key used for obfuscation. The features of design integrated with gate camouflaging can never be reverse engineered. The entire truth table is not needed to attack a design obfuscated by camouflaging. In state space obfuscation, modification cells are added to hide the newly inserted FSM. An attacker cannot reverse engineer
Reverse engineered Read More »
For faster services, inquiry about new assignments submission or follow ups on your assignments please text us/call us on +1 (251) 265-5102