[Resource Topic] 2020/716: Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function

Welcome to the resource topic for 2020/716

Title:
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function

Authors: Takeshi Sugawara, Tatsuya Onuma, Yang Li

Abstract:

Physically unclonable function (PUF) is a technology to generate a device-unique identifier using process variation. PUF enables a cryptographic key that appears only when the chip is active, providing an efficient countermeasure against reverse-engineering attacks. In this paper, we explore the data conversion that digitizes a physical quantity representing PUF’s uniqueness into a numerical value as a new attack surface. We focus on time-to-digital converter (TDC) that converts time duration into a numerical value. We show the first signal injection attack on a TDC by manipulating its clock, and verify it through experiments on an off-the-shelf TDC chip. Then, we show how to leverage the attack to reveal a secret key protected by a PUF that uses a TDC for digitization.

ePrint: https://eprint.iacr.org/2020/716

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .