A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks

06/02/2022
by   Gaoxiang Li, et al.
0

Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained network nodes. The XOR Arbiter PUF (XOR PUF or XPUF) is an intensively studied PUF invented to improve the security of the Arbiter PUF, probably the most lightweight delay-based PUF. Recently, highly powerful machine learning attack methods were discovered and were able to easily break large-sized XPUFs, which were highly secure against earlier machine learning attack methods. Component-differentially-challenged XPUFs (CDC-XPUFs) are XPUFs with different component PUFs receiving different challenges. Studies showed they were much more secure against machine learning attacks than the conventional XPUFs, whose component PUFs receive the same challenge. But these studies were all based on earlier machine learning attack methods, and hence it is not clear if CDC-XPUFs can remain secure under the recently discovered powerful attack methods. In this paper, the two current most powerful two machine learning methods for attacking XPUFs are adapted by fine-tuning the parameters of the two methods for CDC-XPUFs. Attack experiments using both simulated PUF data and silicon data generated from PUFs implemented on field-programmable gate array (FPGA) were carried out, and the experimental results showed that some previously secure CDC-XPUFs of certain circuit parameter values are no longer secure under the adapted new attack methods, while many more CDC-XPUFs of other circuit parameter values remain secure. Thus, our experimental attack study has re-defined the boundary between the secure region and the insecure region of the PUF circuit parameter space, providing PUF manufacturers and IoT security application developers with valuable information in choosing PUFs with secure parameter values.

READ FULL TEXT
research
10/04/2022

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Physical Unclonable Functions (PUFs) are promising security primitives f...
research
03/24/2021

A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks

Security is of critical importance for the Internet of Things (IoT). Man...
research
06/22/2022

HybridRAM: The first quantum approach for key recovery attacks on Rainbow

A rectangular MinRank attack, proposed by Ward Beullens in 2021, reduced...
research
01/06/2023

Linear and non-linear machine learning attacks on physical unclonable functions

In this thesis, several linear and non-linear machine learning attacks o...
research
09/30/2019

Generalized DC loop current attack against the KLJN secure key exchange scheme

A new attack against the Kirchhoff Law Johnson Noise (KLJN) secure key d...
research
07/17/2020

Design And Modelling An Attack on Multiplexer Based Physical Unclonable Function

This paper deals with study of the physical unclonable functions and spe...
research
09/29/2020

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud

In their continuous growth and penetration into new markets, Field Progr...

Please sign up or login with your details

Forgot password? Click here to reset