Chrome Extension
WeChat Mini Program
Use on ChatGLM

A Novel Attack on Machine-Learning Resistant Physical Unclonable Functions

2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)(2022)

Cited 2|Views7
No score
Abstract
Many of today's proposed designs for strong physical unclonable functions (PM) are constructed from strong PUF building blocks that are known to be themselves vulnerable to machine-learning (ML) attacks, such as the Arbiter PUF or Ring Oscillator PUF. These designs aim to make the global design ML resistantby obscuring the true challenge and/or responses corresponding to the vulnerable building blocks, thereby making it more difficult for ML attacks to infer underlying model parameters. In this work, we propose a model-free ML attack, inspired by deep learning-based image imputation algorithms, that successfully breaks these popular countermeasures. Our attack is unique in that it uses not only the observed challenge-response pairs (CRPs) of the device being attacked but also uses CRPs collected from other PM of the same type, which results in improved bit-error rates (BERs). We show that our attack breaks several proposed ML-resistant PUF architectures based on obfuscation of vulnerable strong NT building blocks.
More
Translated text
Key words
physical unclonable functions,machine learning
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined