Feed-Forward XOR PUFs: Reliability and Attack-Resistance Analysis

被引:7
作者
Avvaru, S. V. Sandeep [1 ]
Parhi, Keshab K. [1 ]
机构
[1] Univ Minnesota, Dept Elect & Comp Engn, Minneapolis, MN 55455 USA
来源
GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI | 2019年
基金
美国国家科学基金会;
关键词
Hardware Security; XOR PUF; Feed-Forward PUF; Feed-Forward XOR PUF; Artificial Neural Network; Reliability; Security;
D O I
10.1145/3299874.3318019
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Physical unclonable functions (PUFs) can be used to generate unique signatures of integrated circuit (IC) chips. XOR arbiter PUFs (XOR PUFs), that typically contain multiple standard arbiter PUFs as their components, are more secure than standard arbiter PUFs. This paper proposes design of feed-forward XOR PUFs (FFXOR PUFs) where each component PUF is a feed-forward arbiter PUF (FF PUF). Arbiter PUFs suffer from two main drawbacks: vulnerability to modeling attacks and degraded reliability. It is shown that FFXOR PUFs cannot be accurately modeled if the number of component PUFs is more than 5 or 6. We also state that the number of machine learning runs required to learn a model using evolutionary strategies increases by a factor of N-2/2 if N-stage FF PUFs with one loop are used as components instead of standard arbiter PUFs. In general, for FF PUFs with k loops (one intermediate arbiter), it would increase by a factor of ((N)(k+1)). We also show that the use of a thresholding strategy can increase the reliability of FFXOR PUFs by about 30% for a 15% noise level.
引用
收藏
页码:287 / 290
页数:4
相关论文
共 13 条
[1]  
[Anonymous], P INT S LOW POW EL D
[2]  
[Anonymous], INT WORKSH CRYPT HAR
[3]  
[Anonymous], 44 ACM IEEE DAC
[4]  
Avvaru SVS, 2017, MIDWEST SYMP CIRCUIT, P934, DOI 10.1109/MWSCAS.2017.8053078
[5]  
Avvaru SVS, 2016, DES AUT TEST EUROPE, P543
[6]   Why Attackers Win: On the Learnability of XOR Arbiter PUFs [J].
Ganji, Fatemeh ;
Tajik, Shahin ;
Seifert, Jean-Pierre .
TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 :22-39
[7]   Physical Unclonable Functions and Applications: A Tutorial [J].
Herder, Charles ;
Yu, Meng-Day ;
Koushanfar, Farinaz ;
Devadas, Srinivas .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1126-1141
[8]  
Hospodar G, 2012, IEEE INT WORKS INFOR, P37, DOI 10.1109/WIFS.2012.6412622
[9]  
Katzenbeisser S, 2012, LECT NOTES COMPUT SC, V7428, P283, DOI 10.1007/978-3-642-33027-8_17
[10]  
Koyily A, 2018, ASIA S PACIF DES AUT, P76, DOI 10.1109/ASPDAC.2018.8297286