Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018)
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks in cryptographic protocols. While most PUFs require dedicated circuitry, recent research leverages DRAM hardware for PUFs due to its intrinsic properties and wide deployment. Recently, a new memory-based PUF was proposed that utilizes the infamous Rowhammer effect in DRAM. In this paper, we show two remote attacks on DRAM-based PUFs. First, a DoS attack that exploits the Rowhammer effect to manipulate PUF responses. Second, a modeling attack that predicts PUF responses by observing few challenge-response pairs. Our results indicate that DRAM may not be suitable for PUFs.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2018 |
Autor(en): | Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza |
Art des Eintrags: | Bibliographie |
Titel: | It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs |
Sprache: | Englisch |
Publikationsjahr: | Juni 2018 |
Titel der Zeitschrift, Zeitung oder Schriftenreihe: | Design Automation Conference (DAC) 2018 |
Buchtitel: | Design Automation Conference (DAC) 2018 |
Kurzbeschreibung (Abstract): | Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks in cryptographic protocols. While most PUFs require dedicated circuitry, recent research leverages DRAM hardware for PUFs due to its intrinsic properties and wide deployment. Recently, a new memory-based PUF was proposed that utilizes the infamous Rowhammer effect in DRAM. In this paper, we show two remote attacks on DRAM-based PUFs. First, a DoS attack that exploits the Rowhammer effect to manipulate PUF responses. Second, a modeling attack that predicts PUF responses by observing few challenge-response pairs. Our results indicate that DRAM may not be suitable for PUFs. |
Freie Schlagworte: | Primitives; P3 |
ID-Nummer: | TUD-CS-2018-0033 |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Systemsicherheit DFG-Sonderforschungsbereiche (inkl. Transregio) DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche Profilbereiche Profilbereiche > Cybersicherheit (CYSEC) DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen |
Hinterlegungsdatum: | 19 Feb 2018 12:30 |
Letzte Änderung: | 02 Mai 2019 10:22 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |