Design Exploration and Security Assessment of PUF-on-PUF Implementations

06/23/2022
by   Kleber Stangherlin, et al.
0

We design, implement, and assess the security of several variations of the PUF-on-PUF (POP) architecture. We perform extensive experiments with deep neural networks (DNNs), showing results that endorse its resilience to learning attacks when using APUFs with 6, or more, stages in the first layer. Compositions using APUFs with 2, and 4 stages are shown vulnerable to DNN attacks. We reflect on such results, extending previous techniques of influential bits to assess stage bias in APUF instances. Our data shows that compositions not always preserve security properties of PUFs, the size of PUFs used plays a crucial role. We implemented a testchip in 65 nm CMOS to obtain accurate measurements of uniformity, uniqueness, and response stability for our POP implementations. Measurement results show that minimum bit error rate is obtained when using APUFs with 8 stages in the first layer, while fewer APUF stages lead to a large spread of bit error rate across different chips.

READ FULL TEXT

page 1

page 2

page 3

page 5

page 6

page 7

page 9

page 10

research
10/08/2022

Low Error-Rate Approximate Multiplier Design for DNNs with Hardware-Driven Co-Optimization

In this paper, two approximate 3*3 multipliers are proposed and the synt...
research
03/30/2020

DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips

Security of machine learning is increasingly becoming a major concern du...
research
06/07/2022

Enhancing Strong PUF Security with Non-monotonic Response Quantization

Strong physical unclonable functions (PUFs) provide a low-cost authentic...
research
09/12/2023

Unveiling Signle-Bit-Flip Attacks on DNN Executables

Recent research has shown that bit-flip attacks (BFAs) can manipulate de...
research
03/08/2013

Security Assessment of Software Design using Neural Network

Security flaws in software applications today has been attributed mostly...
research
11/07/2022

Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs

With rapid advancements in electronic gadgets, the security and privacy ...

Please sign up or login with your details

Forgot password? Click here to reset