On the Pitfalls of Using Arbiter-PUFs as Building Blocks

被引:86
作者
Becker, Georg T. [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, D-44801 Bochum, Germany
关键词
Evolution strategies (ES); machine learning; physical unclonable functions (PUFs); reverse fuzzy extractor; AUTHENTICATION;
D O I
10.1109/TCAD.2015.2427259
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physical unclonable functions (PUFs) have emerged as a promising solution for securing resource-constrained embedded devices such as RFID tokens. PUFs use the inherent physical differences of every chip to either securely authenticate the chip or generate cryptographic keys without the need of nonvolatile memory. However, PUFs have shown to be vulnerable to model building attacks if the attacker has access to challenge and response pairs. In these model building attacks, machine learning is used to determine the internal parameters of the PUF to build an accurate software model. Nevertheless, PUFs are still a promising building block and several protocols and designs have been proposed that are believed to be resistant against machine learning attacks. In this paper, we take a closer look at two such protocols, one based on reverse fuzzy extractors and one based on pattern matching. We show that it is possible to attack these protocols using machine learning despite the fact that an attacker does not have access to direct challenge and response pairs. The introduced attacks demonstrate that even highly obfuscated responses can be used to attack PUF protocols. Hence, this paper shows that even protocols in which it would be computationally infeasible to compute enough challenge and response pairs for a direct machine learning attack can be attacked using machine learning.
引用
收藏
页码:1295 / 1307
页数:13
相关论文
共 21 条
  • [1] A Formal Foundation for the Security Features of Physical Functions
    Armknecht, Frederik
    Maes, Roel
    Sadeghi, Ahmad-Reza
    Standaert, Francois-Xavier
    Wachsmann, Christian
    [J]. 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 397 - 412
  • [2] Becker G.T., 2014, IACR Cryptology ePrint Archive, V287
  • [3] Secure lightweight entity authentication with strong PUFs: Mission impossible?
    Delvaux, Jeroen
    Gu, Dawu
    Schellekens, Dries
    Verbauwhede, Ingrid
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 451 - 475
  • [4] Delvaux J, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P137, DOI 10.1109/HST.2013.6581579
  • [5] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
  • [6] Controlled Physical Random Functions
    Gassend, B
    Clarke, D
    van Dijk, M
    Devadas, S
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 149 - 160
  • [7] Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
  • [8] Hansen N, 2006, STUD FUZZ SOFT COMP, V192, P75
  • [9] Hospodar G, 2012, IEEE INT WORKS INFOR, P37, DOI 10.1109/WIFS.2012.6412622
  • [10] Katzenbeisser S, 2012, LECT NOTES COMPUT SC, V7428, P283, DOI 10.1007/978-3-642-33027-8_17