CMOS: Dynamic Multi-key Obfuscation Structure for Strong PUFs

06/06/2018
by   Jiliang Zhang, et al.
0

Strong physical unclonable function (PUF) is a promising solution for device authentication in resourceconstrained applications but vulnerable to machine learning attacks. In order to resist such attack, many defenses have been proposed in recent years. However, these defenses incur high hardware overhead, degenerate reliability and are inefficient against advanced machine learning attacks. In order to address these issues, we propose a dynamic multi-key obfuscation structure (CMOS) for strong PUFs to resist all machine learning attacks. The basic idea is that several stable responses are derived from the PUF itself and pre-stored as the obfuscation keys in the testing phase, and then a true random number generator is used to select any two keys to obfuscate challenges and responses with simple XOR operations. When the number of challengeresponse pairs (CRPs) collected by the attacker exceeds the given threshold, the obfuscation keys will be updated immediately. In this way, any machine learning attacks can be prevented with extremely low hardware overhead. Experimental results show that for a 64x64 Arbiter PUF, when 32 obfuscation keys are used and even if 1 million CRPs are collected by attackers, the prediction accuracies of Logistic regression, support vector machines, artificial neural network, convolutional neural network and covariance matrix adaptive evolutionary strategy are about 50 guessing.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/06/2018

DMOS-PUF: Dynamic Multi-key-selection Obfuscation for Strong PUFs against Machine Learning Attacks

Strong physical unclonable function (PUF) is a promising solution for de...
research
05/12/2023

A Lightweight Authentication Protocol against Modeling Attacks based on a Novel LFSR-APUF

Simple authentication protocols based on conventional physical unclonabl...
research
08/25/2023

Active learning for fast and slow modeling attacks on Arbiter PUFs

Modeling attacks, in which an adversary uses machine learning techniques...
research
02/20/2019

Machine Learning Techniques to Detecting and Preventing Jamming Attacks in Optical Networks

We study the effectiveness of various machine learning techniques, inclu...
research
09/15/2019

A Vector Space Approach to Generate Dynamic Keys for Hill Cipher

In this paper a variant of the Hill cipher is proposed. In the classical...
research
08/31/2021

EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion

Hardware wallets are designed to withstand malware attacks by isolating ...
research
01/28/2021

GF-Flush: A GF(2) Algebraic Attack on Secure Scan Chains

Scan chains provide increased controllability and observability for test...

Please sign up or login with your details

Forgot password? Click here to reset