首页> 外文会议>International workshop to Radio frequency identification: Security and privacy issues >On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
【24h】

On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation

机译:PUF机器学习攻击的规模及其在噪声分叉中的应用

获取原文
获取外文期刊封面目录资料

摘要

Physical Unclonable Functions (PUFs) are seen as a promising alternative to traditional cryptographic algorithms for secure and lightweight device authentication. However, most strong PUF proposals can be attacked using machine learning algorithms in which a precise software model of the PUF is determined. One of the most popular strong PUFs is the XOR Arbiter PUF. In this paper, we examine the machine learning resistance of the XOR Arbiter PUF by replicating the attack by Ruehrmaier et al. from CCS 2010. Using a more efficient implementation we are able to confirm the predicted exponential increase in needed number of responses for increasing XORs. However, our results show that the machine learning performance does not only depend on the PUF design and and the number of used response bits, but also on the specific PUF instance under attack. This is an important observation for machine learning attacks on PUFs in general. This instance-dependent behavior makes it difficult to determine precise lower bounds of the required number of challenge and response pairs (CRPs) and hence such numbers should always be treated with caution. Furthermore, we examine a machine learning countermeasure called noise bifurcation that was recently introduced at HOST 2014. In noise bifurcation, the machine learning resistance of XOR Arbiter PUFs is increased at the cost of using more responses during the authentication process. However, we show that noise bifurcation has a much smaller impact on the machine learning resistance than the results from HOST 2014 suggest.
机译:物理不可克隆功能(PUF)被视为用于安全和轻量级设备身份验证的传统加密算法的有前途的替代方法。但是,可以使用机器学习算法来攻击大多数强大的PUF建议,在这些算法中,可以确定PUF的精确软件模型。 XOR仲裁器PUF是最受欢迎的强大PUF之一。在本文中,我们通过复制Ruehrmaier等人的攻击来检查XOR仲裁器PUF的机器学习抵抗力。来自CCS2010。使用更有效的实现,我们能够确认增加的XOR所需的响应数量呈指数增长。但是,我们的结果表明,机器学习性能不仅取决于PUF设计和所使用的响应位数,还取决于受到攻击的特定PUF实例。通常,这是对PUF进行机器学习攻击的重要观察结果。这种依赖于实例的行为使得很难确定所需的质询和响应对(CRP)数量的精确下限,因此应始终谨慎对待此类数量。此外,我们研究了最近在HOST 2014上引入的一种称为“噪声分叉”的机器学习对策。在噪声分叉中,XOR Arbiter PUF的机器学习抵抗力以在身份验证过程中使用更多响应为代价而增加。但是,我们表明,噪声分叉对机器学习抵抗力的影响要比HOST 2014的结果小得多。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号