首页> 外文会议>IEEE International Verification and Security Workshop >Lightweight Obfuscation Techniques for Modeling Attacks Resistant PUFs
【24h】

Lightweight Obfuscation Techniques for Modeling Attacks Resistant PUFs

机译:用于建模攻击抗性PUF的轻量级混淆技术

获取原文

摘要

Building lightweight security for low-cost pervasive devices is a major challenge considering the design requirements of a small footprint and low power consumption. Physical Unclonable Functions (PUFs) have emerged as a promising technology to provide a low-cost authentication for such devices. By exploiting intrinsic manufacturing process variations, PUFs are able to generate unique and apparently random chip identifiers. Strong-PUFs represent a variant of PUFs that have been suggested for lightweight authentication applications. Unfortunately, many of the Strong-PUFs have been shown to be susceptible to modelling attacks (i.e., using machine learning techniques) in which an adversary has access to challenge and response pairs. In this study, we propose an obfuscation technique during post-processing of Strong-PUF responses to increase the resilience against machine learning attacks. We conduct machine learning experiments using Support Vector Machines and Artificial Neural Networks on two Strong-PUFs: a 32-bit Arbiter-PUF and a 2-XOR 32-bit Arbiter-PUF. The predictability of the 32-bit Arbiter-PUF is reduced to ≈ 70% by using an obfuscation technique. Combining the obfuscation technique with 2-XOR 32-bit Arbiter-PUF helps to reduce the predictability to ≈ 64%. More reduction in predictability has been observed in an XOR Arbiter-PUF because this PUF architecture has a good uniformity. The area overhead with an obfuscation technique consumes only 788 and 1080 gate equivalents for the 32-bit Arbiter-PUF and 2-XOR 32-bit Arbiter-PUF, respectively.
机译:考虑小型占地面积小和低功耗的设计要求,为低成本普遍设备构建轻质安全性是一项重大挑战。物理不可渗透功能(PUF)已成为一个有希望的技术,为这些设备提供低成本认证。通过利用内在制造过程变化,PUF能够生成唯一且明显随机芯片标识符。强PUF表示已经为轻量级认证应用程序建议的PUFS的变体。遗憾的是,许多强PUFS已被证明易于建模攻击(即,使用机器学习技术),其中对手可以获得挑战和反应对。在这项研究中,我们提出了一种在强PUF响应后处理过程中的混淆技术,以增加对机器学习攻击的恢复力。我们使用支持向量机和人工神经网络进行机器学习实验,两个强PUFS:32位arber-Puf和2-xor 32位arbit-puf。通过使用混淆技术将32位仲裁器-PUF的可预测性降低至≈70%。将混淆技术与2-xor 32位arbiter-puf组合有助于降低≈44%的可预测性。在XOR arbiter-PUF中已经观察到可预测性的更多降低,因为这种PUF架构具有良好的均匀性。具有混淆技术的区域开销分别为32位仲裁器-PUF和2-XOR 32位仲裁器-PUF仅消耗788和1080门等效物。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号