A Fourier Analysis Based Attack against Physically Unclonable Functions
نویسندگان
چکیده
Electronic payment systems have leveraged the advantages offered by the RFID technology, whose security is promised to be improved by applying the notion of Physically Unclonable Functions (PUFs). Along with the evolution of PUFs, numerous successful attacks against PUFs have been proposed in the literature. Among these are machine learning (ML) attacks, ranging from heuristic approaches to provable algorithms, that have attracted great attention. Our paper pursues this line of research by introducing a Fourier analysis based attack against PUFs. More specifically, this paper focuses on two main aspects of ML attacks, namely being provable and noise tolerant. In this regard, we prove that our attack is naturally integrated into a provable Probably Approximately Correct (PAC) model. Moreover, we show that our attacks against known PUF families are effective and applicable even in the presence of noise. Our proof relies heavily on the intrinsic properties of these PUF families, namely arbiter, Ring Oscillator (RO), and Bistable Ring (BR) PUF families. We believe that our new style of ML algorithms, which take advantage of the Fourier analysis principle, can offer better measures of PUF security.
منابع مشابه
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, called memory attacks, has received increasingly more attention. These attacks allow an adversary to measure a significant fraction of secret key bits directly from memory, independent of any computational side-channels. Physically ...
متن کاملNoise-Tolerant Machine Learning Attacks against Physically Unclonable Functions
Along with the evolution of Physically Unclonable Functions (PUFs) numerous successful attacks against PUFs have been proposed in the literature. Among these are machine learning (ML) attacks, ranging from heuristic approaches to provable algorithms, that have attracted great attention. Nevertheless, the issue of dealing with noise has so far not been addressed in this context. Thus, it is not ...
متن کاملHardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A public physically unclonable function (PPUF) is a PUF that is created so that its simulation is feasible but requires very large time even when ample computational resources are available. Using PPUFs, we have developed conceptually...
متن کاملPaper Summary: Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions
This is a summary of paper on Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions as part of the final project for Principles of Software Security, Fall 2015 course. Keywords—Physical Unclonable Function, Challenge, Response.
متن کاملAnti-Counterfeiting technique based Reflective-Physically Unclonable Functions
Reflective Physically Unclonable Functions (r-PUFs) are a manifestation of a security principle where two dimensional projections of randomly distributed reflective microstructures in a three dimensional plane form the basis of an anticounterfeiting technique. In this paper we present an overview of the system design with focus on optical aspects of the technique along with summary results.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017