Neural Network Modeling Attacks on Arbiter-PUF-Based Designs

被引:42
作者
Wisiol, Nils [1 ]
Thapaliya, Bipana [2 ]
Mursi, Khalid T. [3 ]
Seifert, Jean-Pierre [1 ]
Zhuang, Yu [2 ]
机构
[1] Tech Univ Berlin, Secur Telecommun, D-10623 Berlin, Germany
[2] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[3] Univ Jeddah, Dept Cybersecur Coll Comp Sci & Engn, Jeddah 21959, Saudi Arabia
基金
美国国家科学基金会;
关键词
Security; Data models; Analytical models; Cryptography; Neural networks; Machine learning; Predictive models; Physical unclonable function; strong PUFs; machine learning; modeling attacks; arbiter PUF; AUTHENTICATION;
D O I
10.1109/TIFS.2022.3189533
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
By revisiting, improving, and extending recent neural-network based modeling attacks on XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs, (XOR) Feed-Forward Arbiter PUFs, and Interpose PUFs can be attacked faster, up to larger security parameters, and with an order of magnitude fewer challenge-response pairs than previously known both in simulation and in silicon data. To support our claim, we discuss the differences and similarities of recently proposed modeling attacks and offer a fair comparison of the performance of these attacks by implementing all of them using the popular machine learning framework Keras and comparing their performance against the well-studied Logistic Regression attack. Our findings show that neural-network-based modeling attacks have the potential to outperform traditional modeling attacks on PUFs and must hence become part of the standard toolbox for PUF security analysis; the code and discussion in this paper can serve as a basis for the extension of our results to PUF designs beyond the scope of this work.
引用
收藏
页码:2719 / 2731
页数:13
相关论文
共 37 条
[1]  
Aghaie A., 2021, IACR Trans. on Crypt. Hardware and Embedded Systems, P520
[2]  
Alkatheiri MS, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P181, DOI 10.1109/DESEC.2017.8073845
[3]   A Machine Learning-based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things [J].
Aseeri, Ahmad O. ;
Zhuang, Yu ;
Alkatheiri, Mohammed Saeed .
2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, :49-56
[4]   Homogeneous and Heterogeneous Feed-Forward XOR Physical Unclonable Functions [J].
Avvaru, S. V. Sandeep ;
Zeng, Ziqing ;
Parhi, Keshab K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :2485-2498
[5]   The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [J].
Becker, Georg T. .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :535-555
[6]  
Chatterjee D., 2021, SACRED ATTACK FRAMEW
[7]  
Chatterjee D, 2020, ICCAD-IEEE ACM INT
[8]   Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs [J].
Delvaux, Jeroen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) :2043-2058
[9]  
Delvaux J, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P137, DOI 10.1109/HST.2013.6581579
[10]   Strong Machine Learning Attack Against PUFs with No Mathematical Model [J].
Ganji, Fatemeh ;
Tajik, Shahin ;
Faessler, Fabian ;
Seifert, Jean-Pierre .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :391-411