On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation

被引:70
作者
Tobisch, Johannes [1 ]
Becker, Georg T. [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2015 | 2015年 / 9440卷
关键词
Physical Unclonable Function; Machine Learning Attacks; Arbiter PUF; Noise-Bifurcation; AUTHENTICATION;
D O I
10.1007/978-3-319-24837-0_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Physical Unclonable Functions (PUFs) are seen as a promising alternative to traditional cryptographic algorithms for secure and lightweight device authentication. However, most strong PUF proposals can be attacked using machine learning algorithms in which a precise software model of the PUF is determined. One of the most popular strong PUFs is the XOR Arbiter PUF. In this paper, we examine the machine learning resistance of the XOR Arbiter PUF by replicating the attack by Ruhrmaier et al. from CCS 2010. Using a more efficient implementation we are able to confirm the predicted exponential increase in needed number of responses for increasing XORs. However, our results show that the machine learning performance does not only depend on the PUF design and and the number of used response bits, but also on the specific PUF instance under attack. This is an important observation for machine learning attacks on PUFs in general. This instance-dependent behavior makes it difficult to determine precise lower bounds of the required number of challenge and response pairs (CRPs) and hence such numbers should always be treated with caution. Furthermore, we examine a machine learning countermeasure called noise bifurcation that was recently introduced at HOST 2014. In noise bifurcation, the machine learning resistance of XOR Arbiter PUFs is increased at the cost of using more responses during the authentication process. However, we show that noise bifurcation has a much smaller impact on the machine learning resistance than the results from HOST 2014 suggest.
引用
收藏
页码:17 / 31
页数:15
相关论文
共 12 条
  • [1] A Formal Foundation for the Security Features of Physical Functions
    Armknecht, Frederik
    Maes, Roel
    Sadeghi, Ahmad-Reza
    Standaert, Francois-Xavier
    Wachsmann, Christian
    [J]. 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 397 - 412
  • [2] Secure lightweight entity authentication with strong PUFs: Mission impossible?
    Delvaux, Jeroen
    Gu, Dawu
    Schellekens, Dries
    Verbauwhede, Ingrid
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 451 - 475
  • [3] Identification and authentication of integrated circuits
    Gassend, B
    Lim, D
    Clarke, D
    van Dijk, M
    Devadas, S
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11) : 1077 - 1098
  • [4] Controlled Physical Random Functions
    Gassend, B
    Clarke, D
    van Dijk, M
    Devadas, S
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 149 - 160
  • [5] A technique to build a secret key in integrated circuits for identification and authentication applications
    Lee, JW
    Lim, DY
    Gassend, B
    Suh, GE
    van Dijk, M
    Devadas, S
    [J]. 2004 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS, 2004, : 176 - 179
  • [6] Majzoobi M., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P33, DOI 10.1109/SPW.2012.30
  • [7] Majzoobi Mehrdad, 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), P670, DOI 10.1109/ICCAD.2008.4681648
  • [8] PUF Modeling Attacks on Simulated and Silicon Data
    Ruehrmair, Ulrich
    Soelter, Jan
    Sehnke, Frank
    Xu, Xiaolin
    Mahmoud, Ahmed
    Stoyanova, Vera
    Dror, Gideon
    Schmidhuber, Juergen
    Burleson, Wayne
    Devadas, Srinivas
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (11) : 1876 - 1891
  • [9] Modeling Attacks on Physical Unclonable Functions
    Ruehrmair, Ulrich
    Sehnke, Frank
    Soelter, Jan
    Dror, Gideon
    Devadas, Srinivas
    Schmidhuber, Juergen
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 237 - 249
  • [10] Physical unclonable functions for device authentication and secret key generation
    Suh, G. Edward
    Devadas, Srinivas
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +