Strong Machine Learning Attack Against PUFs with No Mathematical Model

被引:49
作者
Ganji, Fatemeh [1 ]
Tajik, Shahin
Faessler, Fabian
Seifert, Jean-Pierre
机构
[1] Tech Univ Berlin, Secur Telecommun, Berlin, Germany
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016 | 2016年 / 9813卷
关键词
Machine learning; PAC learning; Boosting technique; Fourier analysis; Physically Unclonable Functions (PUFs); BOOLEAN FUNCTIONS; FEATURES;
D O I
10.1007/978-3-662-53140-2_19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although numerous attacks revealed the vulnerability of different PUF families to non-invasive Machine Learning (ML) attacks, the question is still open whether all PUFs might be learnable. Until now, virtually all ML attacks rely on the assumption that a mathematical model of the PUF functionality is known a priori. However, this is not always the case, and attention should be paid to this important aspect of ML attacks. This paper aims to address this issue by providing a provable framework for ML attacks against a PUF family, whose underlying mathematical model is unknown. We prove that this PUF family is inherently vulnerable to our novel PAC (Probably Approximately Correct) learning framework. We apply our ML algorithm on the Bistable Ring PUF (BR-PUF) family, which is one of the most interesting and prime examples of a PUF with an unknown mathematical model. We practically evaluate our ML algorithm through extensive experiments on BR-PUFs implemented on Field-Programmable Gate Arrays (FPGA). In line with our theoretical findings, our experimental results strongly confirm the effectiveness and applicability of our attack. This is also interesting since our complex proof heavily relies on the spectral properties of Boolean functions, which are known to hold only asymptotically. Along with this proof, we further provide the theorem that all PUFs must have some challenge bit positions, which have larger influences on the responses than other challenge bits.
引用
收藏
页码:391 / 411
页数:21
相关论文
共 42 条
[1]  
Angluin D., 1988, Machine Learning, V2, P319, DOI 10.1007/BF00116828
[2]  
[Anonymous], 2010, CMOS VLSI Design: A Circuits and Systems Perspective
[3]  
[Anonymous], 2014, ANAL BOOLEAN FUNCTIO, DOI DOI 10.1017/CBO9781139814782
[4]  
[Anonymous], 2014, CYCL 4 DEV HDB
[5]   Towards a Unified Security Model for Physically Unclonable Functions [J].
Armknecht, Frederik ;
Moriyama, Daisuke ;
Sadeghi, Ahmad-Reza ;
Yung, Moti .
TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 :271-287
[6]   A Formal Foundation for the Security Features of Physical Functions [J].
Armknecht, Frederik ;
Maes, Roel ;
Sadeghi, Ahmad-Reza ;
Standaert, Francois-Xavier ;
Wachsmann, Christian .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :397-412
[7]  
Arvind V, 2007, LECT NOTES ARTIF INT, V4754, P120
[8]   Selection of relevant features and examples in machine learning [J].
Blum, AL ;
Langley, P .
ARTIFICIAL INTELLIGENCE, 1997, 97 (1-2) :245-271
[9]   ON LEARNING RING-SUM-EXPANSIONS [J].
FISCHER, P ;
SIMON, HU .
SIAM JOURNAL ON COMPUTING, 1992, 21 (01) :181-192
[10]   BOOSTING A WEAK LEARNING ALGORITHM BY MAJORITY [J].
FREUND, Y .
INFORMATION AND COMPUTATION, 1995, 121 (02) :256-285