2000 character limit reached
Breaking XOR Arbiter PUFs without Reliability Information (2312.01256v1)
Published 3 Dec 2023 in cs.CR
Abstract: Unreliable XOR Arbiter PUFs were broken by a machine learning attack, which targets the underlying Arbiter PUFs individually. However, reliability information from the PUF was required for this attack. We show that, for the first time, a perfectly reliable XOR Arbiter PUF, where no reliability information is accessible, can be efficiently attacked in the same divide-and-conquer manner. Our key insight is that the responses of correlated challenges also reveal their distance to the decision boundary. This leads to a chosen challenge attack on XOR Arbiter PUFs. The effectiveness of our attack is confirmed through PUF simulation and FPGA implementation.
- Georg T. Becker. The gap between promise and reality: On the insecurity of XOR arbiter pufs. In Tim Güneysu and Helena Handschuh, editors, Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, volume 9293 of Lecture Notes in Computer Science, pages 535–555. Springer, 2015.
- Side channel modeling attacks on 65nm arbiter pufs exploiting CMOS device noise. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pages 137–142. IEEE Computer Society, 2013.
- Pitfalls in machine learning-based adversary modeling for hardware systems. In 2020 Design, Automation & Test in Europe Conference & Exhibition, DATE 2020, Grenoble, France, March 9-13, 2020, pages 514–519. IEEE, 2020.
- Pufmeter a property testing tool for assessing the robustness of physically unclonable functions to machine learning attacks. IEEE Access, 7:122513–122521, 2019.
- Rock’n’roll pufs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng., 11(2):105–118, 2021.
- Controlled physical random functions. In 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pages 149–160. IEEE Computer Society, 2002.
- Silicon physical random functions. In Vijayalakshmi Atluri, editor, Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pages 148–160. ACM, 2002.
- Secure remote attestation with strong key insulation guarantees. IEEE Transactions on Computers, 2023.
- Erasable pufs: Formal treatment and generic design. In Chip-Hong Chang, Ulrich Rührmair, Stefan Katzenbeisser, and Patrick Schaumont, editors, Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020, pages 21–33. ACM, 2020.
- Programmable access-controlled and generic erasable PUF design and its applications. J. Cryptogr. Eng., 12(4):413–432, 2022.
- Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. Syst., 13(10):1200–1205, 2005.
- Learning from output transitions: A chosen challenge strategy for ML attacks on pufs. In IEEE/ACM International Symposium on Low Power Electronics and Design, ISLPED 2023, Vienna, Austria, August 7-8, 2023, pages 1–6. IEEE, 2023.
- An optimization-theoretic approach for attacking physical unclonable functions. In Frank Liu, editor, Proceedings of the 35th International Conference on Computer-Aided Design, ICCAD 2016, Austin, TX, USA, November 7-10, 2016, page 45. ACM, 2016.
- Security analysis of arbiter PUF and its lightweight compositions under predictability test. ACM Trans. Design Autom. Electr. Syst., 22(2):20:1–20:28, 2017.
- The interpose PUF: secure PUF design against state-of-the-art machine learning attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019(4):243–290, 2019.
- Modeling attacks on physical unclonable functions. In Ehab Al-Shaer, Angelos D. Keromytis, and Vitaly Shmatikov, editors, Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pages 237–249. ACM, 2010.
- Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, June 4-8, 2007, pages 9–14. IEEE, 2007.
- Combining optimization objectives: New modeling attacks on strong pufs. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021(2):357–389, 2021.
- PUF modeling attack using active learning. In IEEE International Symposium on Circuits and Systems, ISCAS 2018, 27-30 May 2018, Florence, Italy, pages 1–5. IEEE, 2018.
- Why attackers lose: design and security analysis of arbitrarily large XOR arbiter pufs. J. Cryptogr. Eng., 9(3):221–230, 2019.
- Short paper: XOR arbiter pufs have systematic response bias. In Joseph Bonneau and Nadia Heninger, editors, Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers, volume 12059 of Lecture Notes in Computer Science, pages 50–57. Springer, 2020.
- Neural network modeling attacks on arbiter-puf-based designs. IEEE Trans. Inf. Forensics Secur., 17:2719–2731, 2022.