Temperature-Adaptive TRNG-Encrypted MRAM PUF: Enhancing Resistance to Machine Learning Attacks

IF 2.1 3区 工程技术 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Jiaao Dai;Chaoyue Zhang;Da Song;Shuo Fan;Yu Gong;You Wang;Weiqiang Liu
{"title":"Temperature-Adaptive TRNG-Encrypted MRAM PUF: Enhancing Resistance to Machine Learning Attacks","authors":"Jiaao Dai;Chaoyue Zhang;Da Song;Shuo Fan;Yu Gong;You Wang;Weiqiang Liu","doi":"10.1109/TMAG.2025.3544442","DOIUrl":null,"url":null,"abstract":"With the widespread application of the Internet-of-Things (IoT) devices, the physical unclonable function (PUF) has emerged as an essential lightweight hardware security mechanism. However, various powerful machine learning attack techniques have been developed to fake PUFs, presenting a multitude of potential risks. This article proposes a novel PUF design by using the spin-transfer torque magnetic random-access memory (STT-MRAM) and an obfuscation mechanism. The primary performance metrics in terms of uniformity (50.04%), uniqueness (49.745%), and reliability (99.59%) of the proposed PUF have been verified, which validate its functionality. Previous true random number generator (TRNG) designs based on MRAM often fail in extreme temperature conditions due to the degradation of randomness. Therefore, a temperature-adaptive TRNG (TA-TRNG) that can produce true random numbers in a broad temperature range (−25 °C to 125 ° C) is introduced in this work. These random numbers are used as “noise” to obfuscate the responses of the magnetic PUF (MPUF), which makes it difficult to crack the masked challenge-response pairs (CRPs) for attackers. Five different machine learning algorithms have been used to evaluate the resilience of the proposed TA-TRNG-PUF circuit against modeling attacks. The statistical results show that the obfuscated MPUF is on average 18.38% more immune against modeling attacks compared with the one without obfuscation, with predictions approaching random guesses (close to 50%).","PeriodicalId":13405,"journal":{"name":"IEEE Transactions on Magnetics","volume":"61 5","pages":"1-8"},"PeriodicalIF":2.1000,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Magnetics","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10898015/","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

With the widespread application of the Internet-of-Things (IoT) devices, the physical unclonable function (PUF) has emerged as an essential lightweight hardware security mechanism. However, various powerful machine learning attack techniques have been developed to fake PUFs, presenting a multitude of potential risks. This article proposes a novel PUF design by using the spin-transfer torque magnetic random-access memory (STT-MRAM) and an obfuscation mechanism. The primary performance metrics in terms of uniformity (50.04%), uniqueness (49.745%), and reliability (99.59%) of the proposed PUF have been verified, which validate its functionality. Previous true random number generator (TRNG) designs based on MRAM often fail in extreme temperature conditions due to the degradation of randomness. Therefore, a temperature-adaptive TRNG (TA-TRNG) that can produce true random numbers in a broad temperature range (−25 °C to 125 ° C) is introduced in this work. These random numbers are used as “noise” to obfuscate the responses of the magnetic PUF (MPUF), which makes it difficult to crack the masked challenge-response pairs (CRPs) for attackers. Five different machine learning algorithms have been used to evaluate the resilience of the proposed TA-TRNG-PUF circuit against modeling attacks. The statistical results show that the obfuscated MPUF is on average 18.38% more immune against modeling attacks compared with the one without obfuscation, with predictions approaching random guesses (close to 50%).
温度自适应trng加密MRAM PUF:增强对机器学习攻击的抵抗力
随着物联网(IoT)设备的广泛应用,物理不可克隆功能(PUF)已成为一种必不可少的轻量级硬件安全机制。然而,已经开发出各种强大的机器学习攻击技术来伪造puf,这带来了许多潜在的风险。本文提出了一种利用自旋传递转矩磁随机存取存储器(STT-MRAM)和模糊机制设计PUF的新方法。所提出的PUF在一致性(50.04%)、唯一性(49.745%)和可靠性(99.59%)方面的主要性能指标得到了验证,验证了其功能。以往基于MRAM的真随机数发生器(TRNG)设计在极端温度条件下往往由于随机性退化而失效。因此,在本研究中引入了一种温度自适应TRNG (TA-TRNG),它可以在宽温度范围(- 25°C至125°C)内产生真随机数。这些随机数被用作“噪声”来混淆磁PUF (MPUF)的响应,这使得攻击者难以破解掩码挑战响应对(CRPs)。已经使用了五种不同的机器学习算法来评估所提出的TA-TRNG-PUF电路对建模攻击的弹性。统计结果表明,与未混淆的MPUF相比,混淆后的MPUF对建模攻击的免疫力平均提高了18.38%,预测接近随机猜测(接近50%)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Magnetics
IEEE Transactions on Magnetics 工程技术-工程:电子与电气
CiteScore
4.00
自引率
14.30%
发文量
565
审稿时长
4.1 months
期刊介绍: Science and technology related to the basic physics and engineering of magnetism, magnetic materials, applied magnetics, magnetic devices, and magnetic data storage. The IEEE Transactions on Magnetics publishes scholarly articles of archival value as well as tutorial expositions and critical reviews of classical subjects and topics of current interest.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信