PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks

被引:24
作者
Ganji, Fatemeh [1 ]
Forte, Domenic [1 ]
Seifert, Jean-Pierre [2 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res, Gainesville, FL 32611 USA
[2] Tech Univ Berlin, Secur Telecommun, D-10587 Berlin, Germany
基金
美国国家科学基金会;
关键词
Physically unclonable functions; PUF circuit design; machine learning; property testing; PUFS;
D O I
10.1109/ACCESS.2019.2938408
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As PUFs become ubiquitous for commercial products (e.g., FPGAs from Xilinx, Altera, and Microsemi), attacks against these primitives are evolving toward more omnipresent and even advanced techniques. Machine learning (ML) attacks, among other non-invasive attacks, are proven to be feasible and cost-effective in the real-world. However, for PUF designers, it still remains an open question whether their countermeasures, or even new designs, are resistant to these types of attacks. Although standard metrics for estimating PUF quality exist, the most common approaches for measuring resistance to ML attacks are empirical. This paper introduces PUFmeter, a new publicly available toolbox consisting of in-house developed algorithms, to provide a firm basis for the robustness assessment of PUFs against ML attacks. To this end, new metrics and notions are reintroduced by PUFmeter to PUF designers and manufacturers. Furthermore, to prepare the PUF input-output pairs adequately before conducting any analysis, PUFmeter involves modules that output the minimum number of measurement repetitions and the upper bound on the noise level affecting the PUF responses.
引用
收藏
页码:122513 / 122521
页数:9
相关论文
共 49 条
[1]  
Angluin D., 1988, Machine Learning, V2, P343, DOI 10.1023/A:1022873112823
[2]   Towards a Unified Security Model for Physically Unclonable Functions [J].
Armknecht, Frederik ;
Moriyama, Daisuke ;
Sadeghi, Ahmad-Reza ;
Yung, Moti .
TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 :271-287
[3]   A Formal Foundation for the Security Features of Physical Functions [J].
Armknecht, Frederik ;
Maes, Roel ;
Sadeghi, Ahmad-Reza ;
Standaert, Francois-Xavier ;
Wachsmann, Christian .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :397-412
[4]  
ATMEL, 2013, XMEGA A4 MICR
[5]   The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [J].
Becker, Georg T. .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :535-555
[6]  
Bootkrajang Jakramate, 2012, Machine Learning and Knowledge Discovery in Databases. Proceedings of the European Conference (ECML PKDD 2012), P143, DOI 10.1007/978-3-642-33460-3_15
[7]   On the distribution of the Fourier spectrum of Boolean functions [J].
Bourgain, J .
ISRAEL JOURNAL OF MATHEMATICS, 2002, 131 (1) :269-276
[8]   Identifying mislabeled training data [J].
Brodley, CE ;
Friedl, MA .
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 1999, 11 :131-167
[9]   Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs [J].
Delvaux, Jeroen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) :2043-2058
[10]   Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis [J].
Delvaux, Jeroen ;
Gu, Dawu ;
Schellekens, Dries ;
Verbauwhede, Ingrid .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (06) :889-902