...
首页> 外文期刊>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems >A Computationally Efficient Tensor Regression Network-Based Modeling Attack on XOR Arbiter PUF and Its Variants
【24h】

A Computationally Efficient Tensor Regression Network-Based Modeling Attack on XOR Arbiter PUF and Its Variants

机译:基于XOR仲裁器PUF及其变体的基于计算的基于计算的张量回归网络的建模攻击

获取原文
获取原文并翻译 | 示例
           

摘要

XOR arbiter PUF (XOR APUF), where the outputs of multiple arbiter PUF (APUFs) are XOR-ed, has proven to be more robust to machine learning-based modeling attacks. The reported successful modeling attacks for XOR APUF either employ auxiliary side-channel or reliability information, or require enormous computational effort. This robustness is primarily due to the difficulty in learning the unknown internal delay parameter terms in the mathematical model of a XOR APUF, and the robustness increases as the number of APUFs being XOR-ed increases. In this article, we employ a novel machine learning-based modeling technique called efficient CANDECOMP/PARAFAC-tensor regression network (CP-TRN), a variant of CP-decomposition-based tensor regression network, to reduce the computational resource requirement of model building attacks on XOR APUF. We theoretically prove the reduction in computational complexity, as well as give supporting experimental results. In addition, our proposed technique does not require any auxiliary information, and is robust to noisy training data. The proposed technique allowed us to successfully model 64-bit 8-XOR APUF and 128-bit 7-XOR APUF on a single desktop workstation, with high prediction accuracy. Further, we extend the proposed modeling attack technique to XOR APUF variants, e.g., lightweight secure PUF (LSPUF), which rely on input challenge transformation. The modeling accuracy results obtained by us for the LSPUF are comparable with those obtained by applying other state-of-the-art techniques, while requiring less training data.
机译:XOR仲裁器PUF(XOR APUF),其中多个仲裁器PUF(APUF)的输出是XOR-ED,已被证明对基于机器学习的建模攻击更加强大。报告的XOR APUF的成功建模攻击使用辅助侧通道或可靠性信息,或者需要巨大的计算工作。这种稳健性主要是由于难以在XOR APUF的数学模型中学习未知的内部延迟参数术语,并且随着APUF的数量增加,鲁棒性增加了增加。在本文中,我们采用了一种新颖的基于机器学习的建模技术,称为高效的Cancomp / Parafac-Tensor回归网络(CP-TRN),一种基于CP分解的张量回归网络的变型,以减少模型建筑的计算资源要求攻击XOR APUF。我们理论上证明了计算复杂性的降低,以及提供支持实验结果。此外,我们提出的技术不需要任何辅助信息,并且对嘈杂的培训数据具有强大。所提出的技术使我们能够在单个桌面工作站上成功模拟64位8-XOR APUF和128位7-XOR APUF,具有高预测精度。此外,我们将建议的建模攻击技术扩展到XOR APUF变体,例如轻量级安全PUF(LSPUF),依赖于输入挑战转换。我们为LSPUF获得的建模精度结果与通过应用其他最先进的技术获得的那些,同时需要较少的培训数据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号