基于硬件的动态物理不可克隆函数对抗建模攻击

Shailesh Rajput, Jaya Dofe
{"title":"基于硬件的动态物理不可克隆函数对抗建模攻击","authors":"Shailesh Rajput, Jaya Dofe","doi":"10.1109/CSR57506.2023.10224914","DOIUrl":null,"url":null,"abstract":"The widespread adoption of Internet of Things (IoT) devices across various application domains has significantly improved quality of life. However, the resource-constrained, heterogeneous, and low-power nature of these devices poses challenges in ensuring secure communication and authenticity. Physical Unclonable Functions (PUFs) provide a solution by creating a unique and device-specific identity through manufacturing process variations without requiring additional resources. To authenticate IoT devices, a challenge-response pair (CRP) is generated based on the unique characteristics of each device. However, the CRPs generated by PUFs often exhibit high correlation, making them vulnerable to modeling attacks. Despite the proposal of numerous intricate PUF architectures, such as XOR PUF and Interpose PDF, the advancement in machine learning algorithms has enabled modeling attacks on these PUFs. This work presents a hardware-based dynamic PUF and evaluates its performance on field programmable gate arrays (FPGAs). The dynamic nature of the proposed PUF architecture makes it challenging for prevalent machine learning models to predict accurate PUF responses. The research also compares the efficacy of logistic regression and multilayer perceptron-based modeling attacks on Arbiter PUF and XOR PUF architectures. The experimental findings reveal that the dynamic PUF outperforms the other two PUFs against machine learning-based attacks. These results suggest that the dynamic PUF architecture is viable for IoT applications.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Counteracting Modeling Attacks Using Hardware-Based Dynamic Physical Unclonable Function\",\"authors\":\"Shailesh Rajput, Jaya Dofe\",\"doi\":\"10.1109/CSR57506.2023.10224914\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The widespread adoption of Internet of Things (IoT) devices across various application domains has significantly improved quality of life. However, the resource-constrained, heterogeneous, and low-power nature of these devices poses challenges in ensuring secure communication and authenticity. Physical Unclonable Functions (PUFs) provide a solution by creating a unique and device-specific identity through manufacturing process variations without requiring additional resources. To authenticate IoT devices, a challenge-response pair (CRP) is generated based on the unique characteristics of each device. However, the CRPs generated by PUFs often exhibit high correlation, making them vulnerable to modeling attacks. Despite the proposal of numerous intricate PUF architectures, such as XOR PUF and Interpose PDF, the advancement in machine learning algorithms has enabled modeling attacks on these PUFs. This work presents a hardware-based dynamic PUF and evaluates its performance on field programmable gate arrays (FPGAs). The dynamic nature of the proposed PUF architecture makes it challenging for prevalent machine learning models to predict accurate PUF responses. The research also compares the efficacy of logistic regression and multilayer perceptron-based modeling attacks on Arbiter PUF and XOR PUF architectures. The experimental findings reveal that the dynamic PUF outperforms the other two PUFs against machine learning-based attacks. These results suggest that the dynamic PUF architecture is viable for IoT applications.\",\"PeriodicalId\":354918,\"journal\":{\"name\":\"2023 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSR57506.2023.10224914\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224914","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)设备在各个应用领域的广泛采用显著提高了生活质量。然而,这些设备的资源受限、异构和低功耗特性在确保安全通信和真实性方面提出了挑战。物理不可克隆功能(Physical unclable Functions, puf)提供了一种解决方案,它通过制造工艺变化来创建唯一的、特定于设备的标识,而不需要额外的资源。为了对物联网设备进行认证,根据每个设备的独特特征生成一个CRP (challenge-response pair)。然而,由puf生成的crp通常表现出高相关性,使它们容易受到建模攻击。尽管提出了许多复杂的PUF架构,如XOR PUF和Interpose PDF,但机器学习算法的进步使得对这些PUF的建模攻击成为可能。本文提出了一种基于硬件的动态PUF,并评估了其在现场可编程门阵列(fpga)上的性能。所提出的PUF架构的动态性使得普遍的机器学习模型难以预测准确的PUF响应。该研究还比较了逻辑回归和基于多层感知器的建模攻击在Arbiter PUF和XOR PUF架构上的效果。实验结果表明,动态PUF在对抗基于机器学习的攻击方面优于其他两种PUF。这些结果表明,动态PUF架构对于物联网应用是可行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Counteracting Modeling Attacks Using Hardware-Based Dynamic Physical Unclonable Function
The widespread adoption of Internet of Things (IoT) devices across various application domains has significantly improved quality of life. However, the resource-constrained, heterogeneous, and low-power nature of these devices poses challenges in ensuring secure communication and authenticity. Physical Unclonable Functions (PUFs) provide a solution by creating a unique and device-specific identity through manufacturing process variations without requiring additional resources. To authenticate IoT devices, a challenge-response pair (CRP) is generated based on the unique characteristics of each device. However, the CRPs generated by PUFs often exhibit high correlation, making them vulnerable to modeling attacks. Despite the proposal of numerous intricate PUF architectures, such as XOR PUF and Interpose PDF, the advancement in machine learning algorithms has enabled modeling attacks on these PUFs. This work presents a hardware-based dynamic PUF and evaluates its performance on field programmable gate arrays (FPGAs). The dynamic nature of the proposed PUF architecture makes it challenging for prevalent machine learning models to predict accurate PUF responses. The research also compares the efficacy of logistic regression and multilayer perceptron-based modeling attacks on Arbiter PUF and XOR PUF architectures. The experimental findings reveal that the dynamic PUF outperforms the other two PUFs against machine learning-based attacks. These results suggest that the dynamic PUF architecture is viable for IoT applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信