Protection Profile for PUF-based Devices

Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann

Research output: Chapter in Book/Report/Conference proceedingsConference contribution

3 Citations (Scopus)


Physically Unclonable Functions (PUFs) are a promising technology in cryptographic application areas. The idea of PUFs is to make use of the unique "fingerprint" of the IC, to enable generation of secrets or keys without storing sensitive data permanently in memory. Since PUFs are "noisy" functions, some kind of post processing is required to reliably reconstruct the respective PUF response. Based on potential threats and vulnerabilities as well as the security requirements for PUF-based tokens we developed a draft version of a Protection Profile according to Common Criteria. This paper discusses the central parts of this Protection Profile, namely the Target of Evaluation (TOE), PUF-specific security functional requirements (SFRs), and requirements on the operational environment regarding the whole life cycle of the TOE.
Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Proceedings
EditorsNora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
Number of pages8
ISBN (Electronic)9783642554148
ISBN (Print)978-3-642-55414-8
Publication statusPublished - 2014
EventIFIP SEC 2014 29th International Information Security and Privacy Conference - Marrakech, Morocco
Duration: 2 Jun 20144 Jun 2014

Publication series

NameIFIP Advances in Information and Communication Technology
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X


ConferenceIFIP SEC 2014 29th International Information Security and Privacy Conference
Internet address


  • Physically Unclonable Function (PUF)
  • Protection Profile


Dive into the research topics of 'Protection Profile for PUF-based Devices'. Together they form a unique fingerprint.

Cite this