On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
نویسندگان
چکیده
Physical Unclonable Functions (PUFs) are seen as a promising alternative to traditional cryptographic algorithms for secure and lightweight device authentication. However, most strong PUF proposals can be attacked using machine learning algorithms in which a precise software model of the PUF is determined. One of the most popular strong PUFs is the XOR Arbiter PUF. In this paper we examine the machine learning resistance of the XOR Arbiter PUF by replicating the attack by Rührmaier et al. from CCS 2010. Using a more efficient implementation we are able to confirm the predicted exponential increase in needed number of responses for increasing XORs. However, our results show that the machine learning performance does not only depend on the PUF design and and the number of used response bits, but also on the specific PUF instance under attack. This is an important observation for machine learning attacks on PUFs in general. This instance-dependent behavior makes it difficult to determine precise lower bounds of the required number of challenge and response pairs (CRPs) and hence such numbers should always be treated with caution. Furthermore, we examine a machine learning countermeasure called noise bifurcation that was recently introduced at HOST 2014. In noise bifurcation, the machine learning resistance of XOR Arbiter PUFs is increased at the cost of using more responses during the authentication process. However, noise bifurcation has a much lower impact on the machine learning resistance than stated. In particular, we were able to attack all of the PUF designs that could not be attacked in the HOST paper.
منابع مشابه
Active and Passive Side-Channel Attacks on Delay Based PUF Designs
Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key needs to be stored in non-volatile memory makes PUFs especially well suited for embedded systems in which securely generating and storing secret keys is difficult and expensive. Compared to traditional cryptography, PUFs are often believed to be more resistant ...
متن کاملNoise-Tolerant Machine Learning Attacks against Physically Unclonable Functions
Along with the evolution of Physically Unclonable Functions (PUFs) numerous successful attacks against PUFs have been proposed in the literature. Among these are machine learning (ML) attacks, ranging from heuristic approaches to provable algorithms, that have attracted great attention. Nevertheless, the issue of dealing with noise has so far not been addressed in this context. Thus, it is not ...
متن کاملA Fourier Analysis Based Attack against Physically Unclonable Functions
Electronic payment systems have leveraged the advantages offered by the RFID technology, whose security is promised to be improved by applying the notion of Physically Unclonable Functions (PUFs). Along with the evolution of PUFs, numerous successful attacks against PUFs have been proposed in the literature. Among these are machine learning (ML) attacks, ranging from heuristic approaches to pro...
متن کاملModeling delay-based PUFs with Machine Learning
Physical Unclonable Functions (PUFs) are well studied mechanisms to establish keys in vulnerable devices and have many commercial applications. However, weaknesses in specific types of PUFs allow modeling using different methods. Modeling attacks on delay based PUFs will be presented using several Machine Learning (ML) methods that best fit the PUF model. The challenge-response pairs (CRPs) wil...
متن کاملThe Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol executions, which takes less than 200 ms. Using a RFID smartcard emulator, it is then possible to impersonate, i.e., “clone” the PUF. While attacking the 4-way PUF used by these tags can be done using traditional machine l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015