Skip to main content

2023 | OriginalPaper | Buchkapitel

4. Modeling Attacks on PUF

verfasst von : Pranesh Santikellur, Rajat Subhra Chakraborty

Erschienen in: Deep Learning for Computational Problems in Hardware Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Modeling attacks are considered to be the greatest threat against strong PUF implementations, and wide-ranging intensive research is currently underway to develop newer attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lim, D. (2004). Extracting secret keys from integrated circuits. Master’s thesis, Massachusetts Institute of Technology, U.S.A. Lim, D. (2004). Extracting secret keys from integrated circuits. Master’s thesis, Massachusetts Institute of Technology, U.S.A.
2.
Zurück zum Zitat Wisiol, N., Mühl, C., Pirnay, N., Nguyen, P. H., Margraf, M., Seifert, J. -P., van Dijk, M., & Rührmair, U. (2019). Splitting the interpose PUF: A novel modeling attack strategy. Cryptology ePrint Archive, Report 2019/1473, https://eprint.iacr.org/2019/1473. Wisiol, N., Mühl, C., Pirnay, N., Nguyen, P. H., Margraf, M., Seifert, J. -P., van Dijk, M., & Rührmair, U. (2019). Splitting the interpose PUF: A novel modeling attack strategy. Cryptology ePrint Archive, Report 2019/1473, https://​eprint.​iacr.​org/​2019/​1473.
3.
Zurück zum Zitat Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., & Schmidhuber, J. (2010). Modeling attacks on physical unclonable functions. In Proceedings of the ACM Conference on Computer and Communications Security, Ser. CCS’10, 237–249. Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., & Schmidhuber, J. (2010). Modeling attacks on physical unclonable functions. In Proceedings of the ACM Conference on Computer and Communications Security, Ser. CCS’10, 237–249.
4.
Zurück zum Zitat Majzoobi, M., Koushanfar, F., & Potkonjak, M. (2008). Lightweight secure PUFs. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, Ser. ICCAD’08, 670–673. Majzoobi, M., Koushanfar, F., & Potkonjak, M. (2008). Lightweight secure PUFs. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, Ser. ICCAD’08, 670–673.
5.
Zurück zum Zitat Machida, T., Yamamoto, D., Iwamoto, M., & Sakiyama, K. (2015). A new arbiter PUF for enhancing unpredictability on FPGA. The Scientific World Journal, 2015. Machida, T., Yamamoto, D., Iwamoto, M., & Sakiyama, K. (2015). A new arbiter PUF for enhancing unpredictability on FPGA. The Scientific World Journal, 2015.
6.
Zurück zum Zitat Sahoo, D. P., Mukhopadhyay, D., Chakraborty, R. S., & Nguyen, P. H. (2018). A multiplexer-based arbiter PUF composition with enhanced reliability and security. IEEE Transactions on Computers, 67(3), 403–417.MathSciNetCrossRef Sahoo, D. P., Mukhopadhyay, D., Chakraborty, R. S., & Nguyen, P. H. (2018). A multiplexer-based arbiter PUF composition with enhanced reliability and security. IEEE Transactions on Computers, 67(3), 403–417.MathSciNetCrossRef
7.
Zurück zum Zitat Nguyen, P. H., Sahoo, D. P., Jin, C., Mahmood, K., Rührmair, U., & van Dijk, M. (2018). The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks. Accessed May 2018, from https://eprint.iacr.org/2018/350. Nguyen, P. H., Sahoo, D. P., Jin, C., Mahmood, K., Rührmair, U., & van Dijk, M. (2018). The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks. Accessed May 2018, from https://​eprint.​iacr.​org/​2018/​350.
8.
Zurück zum Zitat Friedman, J., Hastie, T., Tibshirani, R., et al. (2001). The elements of statistical learning. Springer Series in Statistics New York, 1(10). Friedman, J., Hastie, T., Tibshirani, R., et al. (2001). The elements of statistical learning. Springer Series in Statistics New York, 1(10).
9.
Zurück zum Zitat Tobisch, J., & Becker, G. T. (2015). On the scaling of machine learning attacks on PUFs with application to noise bifurcation. In S. Mangard & P. Schaumont (Eds.), Proceedings of International Workshop on Radio Frequency Identification: Security and Privacy Issues, Ser. RFIDSec’15 (pp. 17–31). Tobisch, J., & Becker, G. T. (2015). On the scaling of machine learning attacks on PUFs with application to noise bifurcation. In S. Mangard & P. Schaumont (Eds.), Proceedings of International Workshop on Radio Frequency Identification: Security and Privacy Issues, Ser. RFIDSec’15 (pp. 17–31).
10.
Zurück zum Zitat Aseeri, A. O., Zhuang, Y., & Alkatheiri, M. S. (2018). A machine learning-based security vulnerability study on XOR PUFs for resource-constraint internet of things. In IEEE International Congress on Internet of Things, 2018, 49–56. Aseeri, A. O., Zhuang, Y., & Alkatheiri, M. S. (2018). A machine learning-based security vulnerability study on XOR PUFs for resource-constraint internet of things. In IEEE International Congress on Internet of Things, 2018, 49–56.
11.
Zurück zum Zitat Mursi, K. T., Thapaliya, B., Zhuang, Y., Aseeri, A. O., & Alkatheiri, M. S. (2020). A fast deep learning method for security vulnerability study of XOR PUFs. Electronics, 9(10), 1715.CrossRef Mursi, K. T., Thapaliya, B., Zhuang, Y., Aseeri, A. O., & Alkatheiri, M. S. (2020). A fast deep learning method for security vulnerability study of XOR PUFs. Electronics, 9(10), 1715.CrossRef
12.
Zurück zum Zitat Wisiol, N., Mursi, K. T., Seifert, J.-P., & Zhuang, Y. (2021). Neural-network-based modeling attacks on XOR arbiter PUFs revisited. IACR Cryptology Eprint Archive, 2021, 555. Wisiol, N., Mursi, K. T., Seifert, J.-P., & Zhuang, Y. (2021). Neural-network-based modeling attacks on XOR arbiter PUFs revisited. IACR Cryptology Eprint Archive, 2021, 555.
13.
Zurück zum Zitat Yashiro, R., Machida, T., Iwamoto, M., & Sakiyama, K. (2016). Deep-learning-based security evaluation on authentication systems using arbiter puf and its variants. In K. Ogawa & K. Yoshioka (Eds.), Advances in Information and Computer Security (pp. 267–285). Springer International Publishing. Yashiro, R., Machida, T., Iwamoto, M., & Sakiyama, K. (2016). Deep-learning-based security evaluation on authentication systems using arbiter puf and its variants. In K. Ogawa & K. Yoshioka (Eds.), Advances in Information and Computer Security (pp. 267–285). Springer International Publishing.
14.
Zurück zum Zitat Khalafalla, M., & Gebotys, C. (2019). PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 204–209). Khalafalla, M., & Gebotys, C. (2019). PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 204–209).
15.
16.
Zurück zum Zitat Aghaie, A., & Moradi, A. (2021). Inconsistency of simulation and practice in delay-based strong PUFs. IACR Cryptology ePrint Archive, 2021, 482. Aghaie, A., & Moradi, A. (2021). Inconsistency of simulation and practice in delay-based strong PUFs. IACR Cryptology ePrint Archive, 2021, 482.
17.
Zurück zum Zitat Yu, M.-D., M’Raïhi, D., Verbauwhede, I., & Devadas, S. (2014). A noise bifurcation architecture for linear additive physical functions. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014, 124–129.CrossRef Yu, M.-D., M’Raïhi, D., Verbauwhede, I., & Devadas, S. (2014). A noise bifurcation architecture for linear additive physical functions. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014, 124–129.CrossRef
18.
Zurück zum Zitat Abadi, M., et al. (2016). TensorFlow: A system for large-scale machine learning. In Proceedings of the USENIX Conference on Operating Systems Design and Implementation, Ser. OSDI’16 (pp. 265–283). Abadi, M., et al. (2016). TensorFlow: A system for large-scale machine learning. In Proceedings of the USENIX Conference on Operating Systems Design and Implementation, Ser. OSDI’16 (pp. 265–283).
20.
Zurück zum Zitat Nair, V., & Hinton, G. E. (2010). Rectified linear units improve restricted boltzmann machines. In Proceedings of the International Conference on Machine Learning, Ser. ICML’10 (pp. 807–814). Nair, V., & Hinton, G. E. (2010). Rectified linear units improve restricted boltzmann machines. In Proceedings of the International Conference on Machine Learning, Ser. ICML’10 (pp. 807–814).
21.
Zurück zum Zitat Goodfellow, I. J., Warde-Farley, D., Lamblin, P., Dumoulin, V., Mirza, M., Pascanu, R., Bergstra, J., Bastien, F., & Bengio, Y. (2013). Pylearn2: A machine learning research library. http://arxiv.org/abs/1308.4214. Goodfellow, I. J., Warde-Farley, D., Lamblin, P., Dumoulin, V., Mirza, M., Pascanu, R., Bergstra, J., Bastien, F., & Bengio, Y. (2013). Pylearn2: A machine learning research library. http://​arxiv.​org/​abs/​1308.​4214.
Metadaten
Titel
Modeling Attacks on PUF
verfasst von
Pranesh Santikellur
Rajat Subhra Chakraborty
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-4017-0_4

Neuer Inhalt