A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
نویسندگان
چکیده
Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, provide a higher level security with lower power and area overhead in comparison with traditional cryptographic solutions. However, it has been demonstrated that PUFs are vulnerable to model building attacks, especially those using linear additive functions such as Arbiter PUF (APUF) and k-sum PUF as building units. Nevertheless, both APUFs and k-sum PUFs are highly desirable security primitives, especially for authentication, because they are capable of producing a huge number of challenge response pairs (CRPs) and can be easily integrated into silicon. In this paper, we actually rely on the demonstrated vulnerability of PUFs to model building attacks as well as the relative ease with which this can be achieved to develop a new parameter-based authentication protocol based on obfuscating challenges sent to PUFs and their subsequent recovery. We show, using statistical analysis and model building attacks using published approaches, that constructing a model using machine learning techniques are infeasible when our proposed method is employed. Finally, we also demonstrate that our challenge obfuscation and recovery method can be successfully used for secure key exchange between two parties.
منابع مشابه
Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication
Physical unclonable functions (PUFs), as hardware security primitives, exploit manufacturing randomness to extract hardware instance-specific secrets. One of most popular structures is time-delay based Arbiter PUF attributing to large number of challenge response pairs (CRPs) yielded and its compact realization. However, modeling building attacks threaten most variants of APUFs that are usually...
متن کاملSecurity analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks
Quantum Readout PUFs (QR-PUFs) have been proposed as a technique for remote authentication of objects. The security is based on basic quantum information theoretic principles and the assumption that the adversary cannot efficiently implement arbitrary unitary transformations. We analyze the security of QR-PUF schemes in the case where each challenge consists of precisely n quanta and the dimens...
متن کاملModeling delay-based PUFs with Machine Learning
Physical Unclonable Functions (PUFs) are well studied mechanisms to establish keys in vulnerable devices and have many commercial applications. However, weaknesses in specific types of PUFs allow modeling using different methods. Modeling attacks on delay based PUFs will be presented using several Machine Learning (ML) methods that best fit the PUF model. The challenge-response pairs (CRPs) wil...
متن کاملPhysical Characterization of Arbiter PUFs
As intended by its name, Physically Unclonable Functions (PUFs) are considered as an ultimate solution to deal with insecure storage, hardware counterfeiting, and many other security problems. However, many different successful attacks have already revealed vulnerabilities of certain digital intrinsic PUFs. Although settling-state-based PUFs, such as SRAM PUFs, can be physically cloned by semi-...
متن کاملDeep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack
This is the first work augmenting hardware attacks mounted on obfuscated circuits by incorporating deep recurrent neural network (D− RNN). Logic encryption obfuscation has been used for thwarting counterfeiting, overproduction, and reverse engineering but vulnerable to attacks. There have been efficient schemes, e.g., satis f iability−checking (SAT) based attack, which can potentially compromis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015