all InfoSec news
An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems. (arXiv:2206.07019v1 [cs.CR])
June 15, 2022, 1:20 a.m. | Mohammad Ebrahimabadi, Mohamed Younis, Wassila Lalouani, Naghmeh Karimi
cs.CR updates on arXiv.org arxiv.org
In most PUF-based authentication schemes, a central server is usually engaged
to verify the response of the device's PUF to challenge bit-streams. However,
the server availability may be intermittent in practice. To tackle such an
issue, this paper proposes a new protocol for supporting distributed
authentication while avoiding vulnerability to information leakage where CRPs
could be retrieved from hacked devices and collectively used to model the PUF.
The main idea is to provision for scrambling the challenge bit-stream in a …
attack authentication distributed distributed systems puf systems
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Azure Security Architect
@ First Quality | Remote US - Eastern or Central Timezone
Staff Security Researcher (Network Protocols)
@ Palo Alto Networks | Santa Clara, CA, United States
Senior Product Manager - Endpoint Security
@ Ivanti | Bengaluru, India
Penetration Tester
@ Lostar | İstanbul, Türkiye