Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel

Trevor Kroeger, Wei Cheng, S. Guilley, J. Danger, Naghmeh Karimi
{"title":"Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel","authors":"Trevor Kroeger, Wei Cheng, S. Guilley, J. Danger, Naghmeh Karimi","doi":"10.1109/ITC44778.2020.9325241","DOIUrl":null,"url":null,"abstract":"The silicon primitives known as Physically Unclonable Functions (PUFs) are used for various security purposes including key generation, device authentication, etc. Due to the imperfections in manufacturing process, PUFs produce their unique outputs (responses) for given input signals (challenges) fed to identical circuitry designs. Although PUFs are deployed to preserve security and are assumed to be unclonable, their functionality may still be compromised by modeling attacks. However, such attacks only target one single PUF aiming at reversing its behavior (based on a subset of its challengeresponse pairs), and are not useful for attacking other PUFs. Moreover a subset of the target PUF’s response has to be known by the attacker. This paper moves one step forward and investigates the possibility of Cross-PUF attacks in which a particular PUF’s power fingerprints can be used to break another PUF’s security. In these Cross-PUF attacks, the attacker has at his disposal a reference PUF, and uses its power side-channel to train a machine learning model which can be deployed to attack other identical PUFs. The experimental results show the high success of the proposed attacks even in presence of noise and temperature differences between the target PUF and the one used to train the model. We target arbiter-PUFs but we deduce that the findings extend to all its derivatives, e.g., XOR-PUFs and Feed-Forward-PUFs.","PeriodicalId":251504,"journal":{"name":"2020 IEEE International Test Conference (ITC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Test Conference (ITC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITC44778.2020.9325241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

The silicon primitives known as Physically Unclonable Functions (PUFs) are used for various security purposes including key generation, device authentication, etc. Due to the imperfections in manufacturing process, PUFs produce their unique outputs (responses) for given input signals (challenges) fed to identical circuitry designs. Although PUFs are deployed to preserve security and are assumed to be unclonable, their functionality may still be compromised by modeling attacks. However, such attacks only target one single PUF aiming at reversing its behavior (based on a subset of its challengeresponse pairs), and are not useful for attacking other PUFs. Moreover a subset of the target PUF’s response has to be known by the attacker. This paper moves one step forward and investigates the possibility of Cross-PUF attacks in which a particular PUF’s power fingerprints can be used to break another PUF’s security. In these Cross-PUF attacks, the attacker has at his disposal a reference PUF, and uses its power side-channel to train a machine learning model which can be deployed to attack other identical PUFs. The experimental results show the high success of the proposed attacks even in presence of noise and temperature differences between the target PUF and the one used to train the model. We target arbiter-PUFs but we deduce that the findings extend to all its derivatives, e.g., XOR-PUFs and Feed-Forward-PUFs.
通过功率侧信道对仲裁puf的跨puf攻击
称为物理不可克隆函数(puf)的硅基元用于各种安全目的,包括密钥生成、设备身份验证等。由于制造工艺的不完善,puf为相同电路设计的给定输入信号(挑战)产生独特的输出(响应)。尽管puf是为了保护安全性而部署的,并且被认为是不可克隆的,但是它们的功能仍然可能受到建模攻击的损害。然而,此类攻击仅针对一个旨在逆转其行为的PUF(基于其挑战者响应对的子集),并且对于攻击其他PUF没有用处。此外,攻击者必须知道目标PUF响应的一个子集。本文进一步研究了跨PUF攻击的可能性,其中一个特定PUF的功率指纹可以用来破坏另一个PUF的安全性。在这些跨PUF攻击中,攻击者拥有一个参考PUF,并使用其功率侧信道来训练机器学习模型,该模型可用于攻击其他相同的PUF。实验结果表明,即使存在噪声和目标PUF与用于训练模型的PUF之间的温度差异,所提出的攻击也能取得很高的成功率。我们的目标是仲裁puf,但我们推断,这些发现延伸到它的所有衍生物,例如,xor - puf和前馈puf。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信