{"title":"Feature Extraction Driven Modeling Attack Against Double Arbiter PUF and Its Evaluation","authors":"Susumu Matsumi, Y. Nozaki, M. Yoshikawa","doi":"10.1145/3299819.3299835","DOIUrl":null,"url":null,"abstract":"Many imitations of electronic components exist in the market. The PUF has attracted attention as countermeasures against these imitations. The 2-1 DAPUF is one of the PUFs which is suitable for FPGA implementation. However, it is reported that some PUFs are vulnerable to modeling attacks using feature extraction. Regarding the effectiveness of feature extraction, it has not been evaluated in the modeling attack against 2-1 DAPUF. This study evaluated the effectiveness of feature extraction by simulation and FPGA implementation. The results showed that the feature extraction was effective for modeling attacks against 2-1 DAPUF.","PeriodicalId":119217,"journal":{"name":"Artificial Intelligence and Cloud Computing Conference","volume":"96 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Artificial Intelligence and Cloud Computing Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3299819.3299835","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Many imitations of electronic components exist in the market. The PUF has attracted attention as countermeasures against these imitations. The 2-1 DAPUF is one of the PUFs which is suitable for FPGA implementation. However, it is reported that some PUFs are vulnerable to modeling attacks using feature extraction. Regarding the effectiveness of feature extraction, it has not been evaluated in the modeling attack against 2-1 DAPUF. This study evaluated the effectiveness of feature extraction by simulation and FPGA implementation. The results showed that the feature extraction was effective for modeling attacks against 2-1 DAPUF.