Adversarial Attack against Modeling Attack on PUFs

被引:0
作者
Wang, Sying-Jyan [1 ]
Chen, Yu-Shen [1 ]
Li, Katherine Shu-Min [2 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung, Taiwan
[2] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung, Taiwan
来源
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) | 2019年
关键词
Physical unclonable function (PUF); Machine learning; Modeling attack; Adversarial attack; AUTHENTICATION; ROBUST;
D O I
10.1145/3316781.3317761
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Physical Unclonable Function (PUF) has been proposed for the identification and authentication of devices and cryptographic key generation. A strong PUF provides an extremely large number of device-specific challenge-response pairs (CRP) which can be used for identification. Unfortunately, the CRP mechanism is vulnerable to modeling attack, which uses machine learning (ML) algorithms to predict PUF responses with high accuracy. Many methods have been developed to strengthen strong PUFs with complicated hardware; however, recent studies show that they are still vulnerable by leveraging GPU-accelerated ML algorithms. In this paper, we propose to deal with the problem from a different approach. With a slightly modified CRP mechanism, a PUF can provide poison data such that an accurate model of the PUF under attack cannot be built by ML algorithms. Experimental results show that the proposed method provides an effective countermeasure against modeling attacks on PUF. In addition, the proposed method is compatible with hardware strengthening schemes to provide even better protection for PUFs.
引用
收藏
页数:6
相关论文
共 25 条
[1]  
[Anonymous], P 9 ACM C COMP COMM
[2]  
[Anonymous], IEEE T CIRCUITS
[3]  
[Anonymous], P 18 ANN COMP SEC AP
[4]  
[Anonymous], ADV ESTIMATION DISTR
[5]   On the Pitfalls of Using Arbiter-PUFs as Building Blocks [J].
Becker, Georg T. .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) :1295-1307
[6]   Security Evaluation of Pattern Classifiers under Attack [J].
Biggio, Battista ;
Fumera, Giorgio ;
Roli, Fabio .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (04) :984-996
[7]   Identification and authentication of integrated circuits [J].
Gassend, B ;
Lim, D ;
Clarke, D ;
van Dijk, M ;
Devadas, S .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11) :1077-1098
[8]   Efficient Attack on Non-Linear Current Mirror PUF With Genetic Algorithm [J].
Guo, Qingli ;
Ye, Jing ;
Gong, Yue ;
Hu, Yu ;
Li, Xiaowei .
2016 IEEE 25TH ASIAN TEST SYMPOSIUM (ATS), 2016, :49-54
[9]  
Kumar R, 2014, 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P38, DOI 10.1109/HST.2014.6855565
[10]  
Majzoobi M., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P33, DOI 10.1109/SPW.2012.30