Papers
Topics
Authors
Recent
Search
2000 character limit reached

Practical Non-Invasive Probing Attacks Against Novel Carbon-Nanotube-Based Physical Unclonable Functions

Published 3 Jul 2023 in cs.CR and cs.ET | (2307.01041v1)

Abstract: As the number of devices being interconnected increases, so does also the demand for (lightweight) security. To this end, Physical Unclonable Functions (PUFs) have been proposed as hardware primitives that can act as roots of trust and security. Recently, a new type of PUF based on Carbon NanoTubes (CNTs) has been proposed. At the same time, attacks and testing based on direct electrical probing appear to be moving towards non-invasive techniques. In this context, this work attempts to examine the potential for practical non-invasive probing attacks against the CNT-PUF, a novel PUF based on CNTs. Our results indicate that direct probing might potentially compromise the security of this PUF. Nevertheless, we note that this holds true only in the case that the attacker can directly probe the wire corresponding to the secret value of each CNT-PUF cell. Thus, we can conclude that the examined CNT-PUFs are rather resilient to direct probing attacks, that non-invasive probing methods appear to be promising for testing such PUFs, and that, in order for the attacker to gain the full-length value of the secret, all the relevant channels would need to be probed. Nevertheless, as our work proves, practical non-invasive attacks against the CNT-PUF are feasible and adequate countermeasures need to be employed in order to address this issue.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (16)
  1. Z. Hu, J. M. M. L. Comeras, H. Park, J. Tang, A. Afzali, G. S. Tulevski, J. B. Hannon, M. Liehr, and S.-J. Han, “Physically unclonable cryptographic primitives using self-assembled carbon nanotubes,” Nature Nanotechnology, vol. 11, no. 6, pp. 559–565, 2016. [Online]. Available: https://doi.org/10.1038/nnano.2016.1
  2. E. Burzurí, D. Granados, and E. M. Pérez, “Physically unclonable functions based on single-walled carbon nanotubes: A scalable and inexpensive method toward unique identifiers,” ACS Applied Nano Materials, vol. 2, no. 4, pp. 1796–1801, April 2019. [Online]. Available: https://doi.org/10.1021/acsanm.9b00322
  3. S. Böttger, F. Dietz, M. Hartmann, N. Dahra, E. Kaulfersch, and S. Hermann, “Functional CMOS extension with integrated carbon nano devices,” in 2022 Smart Systems Integration (SSI).   IEEE, 2022, pp. 1–4. [Online]. Available: https://doi.org/10.1109/SSI56489.2022.9901422
  4. M. Moradi, S. Tao, and R. F. Mirzaee, “Physical unclonable functions based on carbon nanotube FETs,” in 2017 IEEE 47th International Symposium on Multiple-Valued Logic (ISMVL).   IEEE, 2017, pp. 124–129. [Online]. Available: https://doi.org/10.1109/ISMVL.2017.33
  5. D.-I. Moon, A. Rukhin, R. P. Gandhiraman, B. Kim, S. Kim, M.-L. Seol, K. J. Yoon, D. Lee, J. Koehne, J.-W. Han, and M. Meyyappan, “Physically unclonable function by an all-printed carbon nanotube network,” ACS Applied Electronic Materials, vol. 1, no. 7, pp. 1162–1168, 2019. [Online]. Available: https://doi.org/10.1021/acsaelm.9b00166
  6. S. Böttger, F. Frank, N. A. Anagnostopoulos, T. Arul, A. Mohamed, M. Hartmann, S. Hermann, and S. Katzenbeisser, “CNT-PUFs: Highly robust physical unclonable functions based on carbon nanotubes,” in 2023 IEEE 23st International Conference on Nanotechnology (NANO).   IEEE, 2023.
  7. T. Sugawara, N. Shoji, K. Sakiyama, K. Matsuda, N. Miura, and M. Nagata, “Exploiting bitflip detector for non-invasive probing and its application to ineffective fault analysis,” in 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).   IEEE, 2017, pp. 49–56. [Online]. Available: https://doi.org/10.1109/FDTC.2017.17
  8. M. T. Rahman and N. Asadizanjani, “Backside security assessment of modern SoCs,” in 2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV).   IEEE, 2019, pp. 18–24. [Online]. Available: https://doi.org/10.1109/MTV48867.2019.00012
  9. L. Liu, H. Huang, and S. Hu, “Lorenz chaotic system-based carbon nanotube physical unclonable functions,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 7, pp. 1408–1421, 2018. [Online]. Available: https://doi.org/10.1109/TCAD.2017.2762919
  10. D. A. Fuhrmann, H. J. Krenner, A. Wixforth, A. Curran, K. A. Prior, R. J. Warburton, and J. Ebbecke, “Noninvasive probing of persistent conductivity in high quality ZnCdSe/ZnSe quantum wells using surface acoustic waves,” Journal of Applied Physics, vol. 107, no. 9, 05 2010, 093717. [Online]. Available: https://doi.org/10.1063/1.3373415
  11. N. A. Anagnostopoulos, “Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them,” Master’s thesis, University of Twente, 2014.
  12. R. Sakamaki, R. Kishikawa, Y. Tojima, S. Kon, I. Somada, S. Matsui, G. Taoka, T. Yoshida, S. Amakawa, and M. Fujishima, “Demonstration of non-invasive probing of CMOS devices with aluminum pads at frequencies up to 500 GHz,” in 2022 99th ARFTG Microwave Measurement Conference (ARFTG).   IEEE, 2022, pp. 1–4. [Online]. Available: https://doi.org/10.1109/ARFTG54656.2022.9896502
  13. M. Kuhn and O. Kömmerling, “Physical security of smartcards,” Information Security Technical Report, vol. 4, no. 2, pp. 28–41, 1999. [Online]. Available: https://doi.org/10.1016/S0167-4048(99)80012-0
  14. O. Kömmerling and M. G. Kuhn, “Design principles for tamper-resistant smartcard processors,” in USENIX Workshop on Smartcard Technology (Smartcard ’99).   USENIX Association, May 1999. [Online]. Available: https://www.usenix.org/conference/usenix-workshop-smartcard-technology/design-principles-tamper-resistant-smartcard
  15. C. Helfmeier, D. Nedospasov, C. Tarnovsky, J. S. Krissler, C. Boit, and J.-P. Seifert, “Breaking and entering through the silicon,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ser. CCS ’13.   New York, NY, USA: Association for Computing Machinery, 2013, p. 733–744. [Online]. Available: https://doi.org/10.1145/2508859.2516717
  16. M. T. Rahman, Q. Shi, S. Tajik, H. Shen, D. L. Woodard, M. Tehranipoor, and N. Asadizanjani, “Physical inspection & attacks: New frontier in hardware security,” in 2018 IEEE 3rd International Verification and Security Workshop (IVSW).   IEEE, 2018, pp. 93–102. [Online]. Available: https://doi.org/10.1109/IVSW.2018.8494856

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.