Neural Network Modeling Attacks on Arbiter-PUF-Based Designs

被引:29
作者
Wisiol, Nils [1 ]
Thapaliya, Bipana [2 ]
Mursi, Khalid T. [3 ]
Seifert, Jean-Pierre [1 ]
Zhuang, Yu [2 ]
机构
[1] Tech Univ Berlin, Secur Telecommun, D-10623 Berlin, Germany
[2] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[3] Univ Jeddah, Dept Cybersecur Coll Comp Sci & Engn, Jeddah 21959, Saudi Arabia
基金
美国国家科学基金会;
关键词
Security; Data models; Analytical models; Cryptography; Neural networks; Machine learning; Predictive models; Physical unclonable function; strong PUFs; machine learning; modeling attacks; arbiter PUF; AUTHENTICATION;
D O I
10.1109/TIFS.2022.3189533
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
By revisiting, improving, and extending recent neural-network based modeling attacks on XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs, (XOR) Feed-Forward Arbiter PUFs, and Interpose PUFs can be attacked faster, up to larger security parameters, and with an order of magnitude fewer challenge-response pairs than previously known both in simulation and in silicon data. To support our claim, we discuss the differences and similarities of recently proposed modeling attacks and offer a fair comparison of the performance of these attacks by implementing all of them using the popular machine learning framework Keras and comparing their performance against the well-studied Logistic Regression attack. Our findings show that neural-network-based modeling attacks have the potential to outperform traditional modeling attacks on PUFs and must hence become part of the standard toolbox for PUF security analysis; the code and discussion in this paper can serve as a basis for the extension of our results to PUF designs beyond the scope of this work.
引用
收藏
页码:2719 / 2731
页数:13
相关论文
共 37 条
  • [1] Aghaie A., 2021, IACR T CRYPTOGRAPH H, V2021, P520, DOI [10.46586/tches.v2021.i3.520-551, DOI 10.46586/TCHES.V2021.I3.520-551]
  • [2] Alkatheiri MS, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P181, DOI 10.1109/DESEC.2017.8073845
  • [3] A Machine Learning-based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things
    Aseeri, Ahmad O.
    Zhuang, Yu
    Alkatheiri, Mohammed Saeed
    [J]. 2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 49 - 56
  • [4] Homogeneous and Heterogeneous Feed-Forward XOR Physical Unclonable Functions
    Avvaru, S. V. Sandeep
    Zeng, Ziqing
    Parhi, Keshab K.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2485 - 2498
  • [5] The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
    Becker, Georg T.
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 535 - 555
  • [6] Chatterjee D., 2021, SACRED ATTACK FRAMEW
  • [7] Chatterjee D, 2020, ICCAD-IEEE ACM INT
  • [8] Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs
    Delvaux, Jeroen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 2043 - 2058
  • [9] Delvaux J, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P137, DOI 10.1109/HST.2013.6581579
  • [10] Strong Machine Learning Attack Against PUFs with No Mathematical Model
    Ganji, Fatemeh
    Tajik, Shahin
    Faessler, Fabian
    Seifert, Jean-Pierre
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 391 - 411