MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
نویسندگان
چکیده
Silicon Physical Unclonable Functions (PUFs) have been proposed as an emerging hardware security primitive in various security applications such as device identification, authentication, and cryptographic key generation. Current so-called ‘strong’ PUFs, which allow a large challenge response space, are compositions of Arbiter PUFs (APUFs), e.g. the x-XOR APUF. Wide scale deployment of state-ofthe-art compositions of APUFs, however, has stagnated due to various mathematical and physical attacks leading to software models that break the unclonability property of PUFs. The current state-of-the-art attack by Becker, CHES 2015, shows that the XOR APUF can be broken by modeling its APUF components separately thanks to CMA-ES, a machine learning algorithm, based on reliability information of measured XOR APUF responses. Thus, it is an important problem to design a strong PUF which can resist not only traditional modeling attacks but also Becker’s attack. In this paper, we propose a new strong PUF design called (x, y)-MXPUF, which consists of two layers; the upper layer is an n-bit x-XOR APUF, and the lower layer is an (n+1)-bit y-XOR APUF. The response of x-XOR APUF for an n-bit challenge c in the upper layer is inserted at the middle of c to construct a new (n + 1)-bit challenge for the y-XOR APUF in the lower layer giving the final response bit of the (x, y)-MXPUF. The reliability of (x, y)-MXPUF can be theoretically and experimentally shown to be twice the reliability of (x + y)-XOR PUF. In the context of traditional modeling attacks, when we keep the same hardware size, the security of (x, y)-MXPUF is only slightly weaker than that of (x+ y)-XOR PUF. Our main contribution proves that the (x, y)-MXPUF is secure against Becker’s attack.
منابع مشابه
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol executions, which takes less than 200 ms. Using a RFID smartcard emulator, it is then possible to impersonate, i.e., “clone” the PUF. While attacking the 4-way PUF used by these tags can be done using traditional machine l...
متن کاملEfficient Power and Timing Side Channels for Physical Unclonable Functions
One part of the original PUF promise was their improved resilience against physical attack methods, such as cloning, invasive techniques, and arguably also side channels. In recent years, however, a number of effective physical attacks on PUFs have been developed [17,18,20,8,2]. This paper continues this line of research, and introduces the first power and timing side channels (SCs) on PUFs, mo...
متن کاملExploiting Unreliability of the PUF to Secure Remote Wireless Sensing
Wireless sensors attracts increasingly attention from both academia and industry owing to emerging applications built upon them such as Internet of Things, smart home, E-Health, and etc. It becomes a concern that the sensed value should be trusted in such applications scenarios. The security of the sensor used to resort to traditional cryptographic techniques, which, however, only provides limi...
متن کاملCombined Modeling and Side Channel Attacks on Strong PUFs
Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core properties have been reported. They concern their physical and digital unclonability, as well as their assumed resilience against invasive or side channel attacks. In this paper, we join some of thes...
متن کاملSD-PUF: Spliced Digital Physical Unclonable Function
Digital circuit physical unclonable function (PUF) have been attracting attentions for the merits of resilience to the environmental and operational variations that analog PUFs suffer from. Existing state-ofthe-art digital circuit PUFs, however, are either hybrid of analog-digital circuits which are still under the shadow of vulnerability, or impractical for real-world applications. In this wor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017