A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication

@article{Yu2016ALT,
  title={A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication},
  author={M. Yu and M. Hiller and J. Delvaux and R. Sowell and S. Devadas and I. Verbauwhede},
  journal={IEEE Transactions on Multi-Scale Computing Systems},
  year={2016},
  volume={2},
  pages={146-159}
}
  • M. Yu, M. Hiller, +3 authors I. Verbauwhede
  • Published 2016
  • Computer Science
  • IEEE Transactions on Multi-Scale Computing Systems
  • We present a lightweight PUF-based authentication approach that is practical in settings where a server authenticates a device, and for use cases where the number of authentications is limited over a device's lifetime. Our scheme uses a server-managed challenge/response pair (CRP) lockdown protocol: unlike prior approaches, an adaptive chosen-challenge adversary with machine learning capabilities cannot obtain new CRPs without the server's implicit permission. The adversary is faced with the… CONTINUE READING
    93 Citations
    A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
    • 2
    • Highly Influenced
    • PDF
    PUF-RLA: A PUF-Based Reliable and Lightweight Authentication Protocol Employing Binary String Shuffling
    • M. Qureshi, A. Munir
    • Computer Science
    • 2019 IEEE 37th International Conference on Computer Design (ICCD)
    • 2019
    • Highly Influenced
    • PDF
    TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs
    • 2
    • Highly Influenced
    • PDF
    Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication
    • 4
    • Highly Influenced
    • PDF
    CMOS: Dynamic Multi-key Obfuscation Structure for Strong PUFs
    • 7
    PUF-IPA: A PUF-based Identity Preserving Protocol for Internet of Things Authentication
    • M. Qureshi, A. Munir
    • Computer Science
    • 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)
    • 2020
    • 1
    • Highly Influenced
    • PDF
    Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks
    • Ye Wang, X. Xi, M. Orshansky
    • Computer Science
    • 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
    • 2020
    • 2
    • Highly Influenced
    • PDF
    A PUF-based hardware mutual authentication protocol
    • 10
    Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems
    • 1

    References

    SHOWING 1-10 OF 41 REFERENCES
    Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
    • 123
    • PDF
    On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
    • 55
    • PDF
    Why Attackers Win: On the Learnability of XOR Arbiter PUFs
    • 58
    • Highly Influential
    Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability
    • 123
    • PDF
    Active and Passive Side-Channel Attacks on Delay Based PUF Designs
    • 50
    • PDF
    Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II
    • 49
    • PDF
    The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
    • 127
    • PDF
    PUF Modeling Attacks on Simulated and Silicon Data
    • 323
    • PDF
    Modeling attacks on physical unclonable functions
    • 668
    • PDF
    Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes
    • 98
    • PDF