Analysis and experimental evaluation of image-based PUFs
- PDF / 759,766 Bytes
- 18 Pages / 595.276 x 790.866 pts Page_size
- 20 Downloads / 179 Views
REGULAR PAPER
Analysis and experimental evaluation of image-based PUFs Saloomeh Shariati · François-Xavier Standaert · Laurent Jacques · Benoit Macq
Received: 7 May 2012 / Accepted: 19 August 2012 / Published online: 23 September 2012 © Springer-Verlag 2012
Abstract Physically unclonable functions (PUFs) are becoming popular tools for various applications, such as anticounterfeiting schemes. The security of a PUF-based system relies on the properties of its underlying PUF. Usually, evaluating PUF properties is not simple as it involves assessing a physical phenomenon. A recent work (Armknecht et al. in A formalization of the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397–412, 2011) proposed a generic security framework of physical functions allowing a sound analysis of security properties of PUFs. In this paper, we specialize this generic framework to model a system based on a particular category of PUFs called image-based PUFs. These PUFs are based on random visual features of the physical objects. The model enables a systematic design of the system ingredients and allows for concrete evaluation of its security properties, namely robustness and physical unclonability which are required by anti-counterfeiting systems. As a practical example, the components of the model are instantiated by Laser-Written PUF, White Light Interferometry evaluation, two binary image hashing procedures namely, Random Binary Hashing and Gabor Binary Hashing, respectively, and code-offset fuzzy extraction. We experimentally evaluate security properties of this example for both image hashing methods. Our results show that, for this particular example, adaptive image hashing outperforms the non-adaptive one. The experiments also confirm the usefulness of the formalizations provided by Armknecht et al. (A formalization of the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397–412, 2011) to a practical example. In parS. Shariati (B) · F.-X. Standaert · L. Jacques · B. Macq ICTEAM Institute, Université Catholique de Louvain, Place du Levant 3, 1348 Louvain-la-Neuve, Belgium e-mail: [email protected]
ticular, the formalizations provide an asset for evaluating the concrete trade-off between robustness and physical unclonability. To the best of our knowledge, this experimental evaluation of explicit trade-off between robustness and physical unclonability has been performed for the first time in this paper. Keywords Physical unclonable functions · Anti-counterfeiting · Image-based PUFs · Robustness · Physical unclonability
1 Introduction The growing trade in counterfeit goods continues affecting the economy worldwide. Many ad-hoc methods have been proposed to avoid counterfeiting. Examples include so-called overt physical identifiers such as hologram and inks that visibly alter under light, or so-called covert technology such as invisible inks, proprietary photonic inks [2] and radio frequency identification (RFID) Tags [3]. Recently, Physically
Data Loading...