A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication

被引:130
作者
Yu, Meng-Day [1 ,2 ,3 ]
Hiller, Matthias [4 ]
Delvaux, Jeroen [5 ,6 ,7 ]
Sowell, Richard [1 ]
Devadas, Srinivas [8 ]
Verbauwhede, Ingrid [5 ,6 ]
机构
[1] Verayo Inc, San Jose, CA 95129 USA
[2] Katholieke Univ Leuven, Comp Secur & Ind Cryptog Lab, Leuven, Belgium
[3] MIT, Comp Sci & Artificial Intelligence Lab, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[4] Tech Univ Munich, Inst Secur Informat Technol, D-80333 Munich, Germany
[5] Katholieke Univ Leuven, COSIC Lab, B-3000 Leuven, Belgium
[6] iMinds, Leuven, Belgium
[7] Shanghai Jiao Tong Univ, Cryptog & Informat Secur Lab, Shanghai, Peoples R China
[8] MIT, CSAIL, 77 Massachusetts Ave, Cambridge, MA 02139 USA
来源
IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS | 2016年 / 2卷 / 03期
关键词
Physical unclonable function; authentication; machine learning; heuristic security; computationally unrestricted adversary; probably approximately correct (PAC) learning;
D O I
10.1109/TMSCS.2016.2553027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a lightweight PUF-based authentication approach that is practical in settings where a server authenticates a device, and for use cases where the number of authentications is limited over a device's lifetime. Our scheme uses a server-managed challenge/ response pair (CRP) lockdown protocol: unlike prior approaches, an adaptive chosen-challenge adversary with machine learning capabilities cannot obtain new CRPs without the server's implicit permission. The adversary is faced with the problem of deriving a PUF model with a limited amount of machine learning training data. Our system-level approach allows a so-called strong PUF to be used for lightweight authentication in a manner that is heuristically secure against today's best machine learning methods through a worst-case CRP exposure algorithmic validation. We also present a degenerate instantiation using a weak PUF that is secure against computationally unrestricted adversaries, which includes any learning adversary, for practical device lifetimes and read-out rates. We validate our approach using silicon PUF data, and demonstrate the feasibility of supporting 10, 1,000, and 1M authentications, including practical configurations that are not learnable with polynomial resources, e.g., the number of CRPs and the attack runtime, using recent results based on the probably-approximately-correct (PAC) complexity-theoretic framework.
引用
收藏
页码:146 / 159
页数:14
相关论文
共 38 条
[1]   The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [J].
Becker, Georg T. .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :535-555
[2]  
Becker Georg T., 2014, IACR CRYPTOLOGY EPRI, V2014, P287
[3]  
Bishop C., 2007, PATTERN RECOGNITION
[4]   LEARNABILITY AND THE VAPNIK-CHERVONENKIS DIMENSION [J].
BLUMER, A ;
EHRENFEUCHT, A ;
HAUSSLER, D ;
WARMUTH, MK .
JOURNAL OF THE ACM, 1989, 36 (04) :929-965
[5]   A Survey on Lightweight Entity Authentication with Strong PUFs [J].
Delvaux, Jeroen ;
Peeters, Roel ;
Gu, Dawu ;
Verbauwhede, Ingrid .
ACM COMPUTING SURVEYS, 2015, 48 (02)
[6]   Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis [J].
Delvaux, Jeroen ;
Gu, Dawu ;
Schellekens, Dries ;
Verbauwhede, Ingrid .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (06) :889-902
[7]   Secure lightweight entity authentication with strong PUFs: Mission impossible? [J].
Delvaux, Jeroen ;
Gu, Dawu ;
Schellekens, Dries ;
Verbauwhede, Ingrid .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 :451-475
[8]   Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes [J].
Delvaux, Jeroen ;
Verbauwhede, Ingrid .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2014, 61 (06) :1701-1713
[9]  
Delvaux J, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P137, DOI 10.1109/HST.2013.6581579
[10]   Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications [J].
Devadas, Srinivas ;
Suh, Edward ;
Paral, Sid ;
Sowell, Richard ;
Ziola, Tom ;
Khandelwal, Vivek .
2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, :58-+