PUF modeling attacks: An introduction and overview
@article{Rhrmair2014PUFMA, title={PUF modeling attacks: An introduction and overview}, author={Ulrich R{\"u}hrmair and Jan S{\"o}lter}, journal={2014 Design, Automation \& Test in Europe Conference \& Exhibition (DATE)}, year={2014}, pages={1-6} }
Machine learning (ML) based modeling attacks are the currently most relevant and effective attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide an overview of this method in this paper: We discuss (i) the basic conditions under which it is applicable; (ii) the ML algorithms that have been used in this context; (iii) the latest and most advanced results; (iv) the right interpretation of existing results; and (v) possible future research directions.
Tables from this paper
63 Citations
Machine Learning based Modeling Attacks on a Configurable PUF
- Computer Science, MathematicsNAECON 2018 - IEEE National Aerospace and Electronics Conference
- 2018
This paper examines the resistance of a strong configurable RO-PUF design controlled by Programmable XOR gates (PXOR) towards machine learning based modeling attacks.
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design
- Computer Science2018 IEEE 3rd International Verification and Security Workshop (IVSW)
- 2018
A combination of a 32-bit current mirror and 16-bit arbiter PUFs in 65nm CMOS technology is proposed to improve resilience against modelling attacks.
Countering PUF Modeling Attacks through Adversarial Machine Learning
- Computer Science2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
- 2021
An effective countermeasure against modeling attacks is proposed by employing adversarial machine learning techniques that introduce errors (poison) to the adversary’s model.
Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations
- Computer Science2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
- 2020
This paper shows that aging has a significant impact on modeling attacks, and shows that the ML attack via power traces is particularly efficient to recover the responses of the anti-modeling VTC PUF, yet aging still contributes to enhance its security.
PUFs at a glance
- Computer Science, Mathematics2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)
- 2014
This paper provides a brief and easily accessible overview of the typical security features, implementations, attacks, protocols uses, and applications of Physical Unclonable Functions.
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2019
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by novel machine learning strategies…
A Novel Modeling-Attack Resilient Arbiter-PUF Design
- Computer Science, Mathematics2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID)
- 2021
A modeling-resilient arbiter-PUF architecture that benefits from the randomness provided by PUFs in concealing the obfuscation scheme is proposed and the experimental results confirm the effectiveness of the proposed structure in countering PUF modeling attacks.
Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks
- Computer Science, Mathematics2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)
- 2014
This paper provides a short and easily accessible overview of the session at DATE 2014, and addresses the question of how strong and relevant are these attacks, and how secure are PUFs really.
Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review
- Computer ScienceSensors
- 2021
This paper identifies two architectures of enrollment protocols based on the participating entities and the building blocks that are relevant to the security of the authentication procedure and provides design guidelines for future enrollment protocol designers.
Lightweight obfuscation techniques for modeling attacks resistant PUFs
- Computer Science, Mathematics2017 IEEE 2nd International Verification and Security Workshop (IVSW)
- 2017
This study proposes an obfuscation technique during post-processing of Strong-PUF responses to increase the resilience against machine learning attacks and finds that it reduces the predictability of the 32-bit Arbiter- PUF to less than 70% and more reduction in predictability has been observed in an XOR Arbiters'PUF.
References
SHOWING 1-10 OF 64 REFERENCES
Hybrid side-channel/machine-learning attacks on PUFs: A new threat?
- Computer Science, Mathematics2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)
- 2014
This work presents an overview and survey of side-channel attacks on Physical Unclonable Functions, as well as of classical side channel techniques for PUFs, and proposes a taxonomy based on the characteristics of different side- channel attacks.
Combined Modeling and Side Channel Attacks on Strong PUFs
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2013
The combination of machine-learning based modeling techniques with side channel information allows us to attack so-called XOR Arbiter PUFs and Lightweight PUFs up to a size and complexity that was previously out of reach.
PUFs at a glance
- Computer Science, Mathematics2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)
- 2014
This paper provides a brief and easily accessible overview of the typical security features, implementations, attacks, protocols uses, and applications of Physical Unclonable Functions.
Modeling attacks on physical unclonable functions
- Computer Science, MathematicsCCS '10
- 2010
It is shown in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks, based upon various machine learning techniques including Logistic Regression and Evolution Strategies.
Lightweight secure PUFs
- Computer Science2008 IEEE/ACM International Conference on Computer-Aided Design
- 2008
To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs integration of three key…
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
- Computer Science2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
- 2013
This paper exploits repeatability imperfections of PUF responses as a side channel for model building and demonstrates that 65nm CMOS arbiter PUFs can be modeled successfully, without utilizing any ML algorithm.
The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions
- Computer Science, Mathematics2011 IEEE International Symposium on Hardware-Oriented Security and Trust
- 2011
This paper introduces a new architecture for circuit-based Physical Unclonable Functions (PUFs) which it is argued that this new PUF could be a promising candidate for Strong PUFs.
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2012
New PUF definitions that require only weak average security properties of the PUF are provided, and it is proved that these definitions suffice to realize secure PUF-based oblivious transfer (OT), bit com mitment (BC) and key exchange (KE) in said setting.
On the Foundations of Physical Unclonable Functions
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2009
A comparative analysis between the existing definitions of Physical Unclonable Functions and new notions is provided, by classifying existing PUF implementations with respect to them, and the outcome is that the definitions seem to match the current PUF landscape well, perhaps better than previous definitions.
Applications of High-Capacity Crossbar Memories in Cryptography
- Computer ScienceIEEE Transactions on Nanotechnology
- 2011
This paper proposes a new approach for the construction of highly secure physical unclonable functions (PUFs) that allows the first PUFs that are secure against computationally unrestricted adversaries, and which remain so in the face of weeks or even years of uninterrupted adversarial access.