A Computationally Efficient Tensor Regression Network based Modeling Attack on XOR APUF

被引:0
作者
Santikellur, Pranesh [1 ]
Lakshya [1 ]
Prakash, Shashi Ranjan [1 ]
Chakraborty, Rajat Subhra [1 ]
机构
[1] IIT Kharagpur, SEAL, Dept Comp Sci & Engn, Kharagpur, W Bengal, India
来源
PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST) | 2019年
关键词
decomposition; deep learning; modeling attacks; XOR Arbiter PUF; Tensor Regression Networks; ARBITER PUF; AUTHENTICATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
XOR-arbiter PUF (XOR APUF), where the outputs of multiple APUFs are XOR-ed, has proven to be robust to machine learning based modeling attacks. The reported successful modeling attacks for XOR APUF either employ auxiliary side-channel or reliability information, or require enormous computational effort. This robustness is primarily due to the difficulty in learning the unknown internal delay parameter terms in the mathematical model of a XOR APUF, and the robustness increases as the number of APUFs being XOR-ed increases. In this paper, we employ a novel machine learning based modeling technique called efficient CANDECOMP/PARAFAC-Tensor Regression Network (CP-TRN), a variant of CP-decomposition based tensor regression network, to reduce the computational resource requirement of model building attacks on XOR APUF. In addition, our proposed technique does not require any auxiliary information, and is robust to noisy training data. The proposed technique allowed us to successfully model 64-bit 8-XOR APUF and 128-bit 7-XOR APUF on a single desktop workstation, with high prediction accuracy.
引用
收藏
页数:6
相关论文
共 30 条
  • [21] Morozov S, 2010, LECT NOTES COMPUT SC, V5992, P382, DOI 10.1007/978-3-642-12133-3_37
  • [22] Efficient power and timing side channels for physical unclonable functions
    Rührmair, Ulrich
    Xu, Xiaolin
    Sölter, Jan
    Mahmoud, Ahmed
    Majzoobi, Mehrdad
    Koushanfar, Farinaz
    Burleson, Wayne
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 476 - 492
  • [23] PUFs in Security Protocols: Attack Models and Security Evaluations
    Ruehrmair, Ulrich
    van Dijk, Marten
    [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 286 - 300
  • [24] Modeling Attacks on Physical Unclonable Functions
    Ruehrmair, Ulrich
    Sehnke, Frank
    Soelter, Jan
    Dror, Gideon
    Devadas, Srinivas
    Schmidhuber, Juergen
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 237 - 249
  • [25] A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security
    Sahoo, Durga Prasad
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Phuong Ha Nguyen
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (03) : 403 - 417
  • [26] Simpson E, 2006, LECT NOTES COMPUT SC, V4249, P311
  • [27] Physical unclonable functions for device authentication and secret key generation
    Suh, G. Edward
    Devadas, Srinivas
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +
  • [28] On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
    Tobisch, Johannes
    Becker, Georg T.
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2015, 2015, 9440 : 17 - 31
  • [29] Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
    Yashiro, Risa
    Machida, Takanori
    Iwamoto, Mitsugu
    Sakiyama, Kazuo
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 267 - 285
  • [30] Zhou GX, 2014, Arxiv, DOI [arXiv:1412.1885, DOI 10.48550/ARXIV.1412.1885]