Modeling attacks on physical unclonable functions
Top Cited Papers
Open Access
- 4 October 2010
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 2010, 237-249
- https://doi.org/10.1145/1866307.1866335
Abstract
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. This algorithm can subsequently impersonate the PUF, and can be cloned and distributed arbitrarily. This breaks the security of essentially all applications and protocols that are based on the respective PUF. The PUFs we attacked successfully include standard Arbited PUFs and Ring Oscillator PUFs of arbitrary sizes, and XO Arbiter PUFs, Lightweight Secure PUFs, and Feed-Forward Arbiter PUFs of up to a given size and complexity. Our attacks are based upon various machine learning techniques including Logistic Regression and Evolution Strategies. Our work leads to new design requirements for secure electrical PUFs, and will be useful to PUF designers and attackers alike.Keywords
This publication has 13 references indexed in Scilit:
- Application of mismatched Cellular Nonlinear Networks for Physical CryptographyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Oblivious Transfer Based on Physical Unclonable FunctionsLecture Notes in Computer Science, 2010
- Physical Unclonable Functions and Secure ProcessorsLecture Notes in Computer Science, 2009
- FPGA Intrinsic PUFs and Their Use for IP ProtectionLecture Notes in Computer Science, 2007
- Physical unclonable functions for device authentication and secret key generationProceedings of the 39th conference on Design automation - DAC '02, 2007
- Read-Proof Hardware from Protective CoatingsLecture Notes in Computer Science, 2006
- Extracting secret keys from integrated circuitsIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2005
- A technique to build a secret key in integrated circuits for identification and authentication applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A direct adaptive method for faster backpropagation learning: the RPROP algorithmPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Silicon physical random functionsPublished by Association for Computing Machinery (ACM) ,2002