TY - GEN
T1 - Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs
AU - Alkatheiri, Mohammed Saeed
AU - Zhuang, Yu
N1 - Funding Information:
ACKNOWLEDGMENT The research was supported in part by National Science Foundation under Grant No. CNS-1526055.
Publisher Copyright:
© 2017 IEEE.
PY - 2017/10/18
Y1 - 2017/10/18
N2 - Utilizing integrated circuits' manufacturing variations to produce responses unique for individual devises, physical unclonable functions (PUFs) are not reproducible even by PUF device manufacturers. However, many PUFs have been reported to be 'mathematically reproducible' by machine learning-based modeling methods. The feed-forward arbiter PUFs are among the PUFs which have showed strength [1], [2] against machine learning modeling unless large computation time is used in machine learning process and the feed-forward loops are of a special type. In this paper, we develop a signal delay model for the feed-forward arbiter PUFs, through which efficient and accurate machine learning of the PUF's essential features is made possible. Experimental results show that the new model has led to high accuracy and high efficiency for the prediction of the responses of the PUFs with any type of feed-forward loops, and the high prediction accuracy was measured in terms of average prediction rate over all tested all cases. The high efficiency and high accuracy prediction of responses reported in this paper has revealed a weakness of the feed-forward arbiter PUFs that can be potentially utilized by response-prediction-based malicious software.
AB - Utilizing integrated circuits' manufacturing variations to produce responses unique for individual devises, physical unclonable functions (PUFs) are not reproducible even by PUF device manufacturers. However, many PUFs have been reported to be 'mathematically reproducible' by machine learning-based modeling methods. The feed-forward arbiter PUFs are among the PUFs which have showed strength [1], [2] against machine learning modeling unless large computation time is used in machine learning process and the feed-forward loops are of a special type. In this paper, we develop a signal delay model for the feed-forward arbiter PUFs, through which efficient and accurate machine learning of the PUF's essential features is made possible. Experimental results show that the new model has led to high accuracy and high efficiency for the prediction of the responses of the PUFs with any type of feed-forward loops, and the high prediction accuracy was measured in terms of average prediction rate over all tested all cases. The high efficiency and high accuracy prediction of responses reported in this paper has revealed a weakness of the feed-forward arbiter PUFs that can be potentially utilized by response-prediction-based malicious software.
KW - Arbiter PUF
KW - Feed-Forward Arbiter PUF
KW - Machine Learning Attack
KW - Multilayer Neural Network
UR - http://www.scopus.com/inward/record.url?scp=85039911423&partnerID=8YFLogxK
U2 - 10.1109/DESEC.2017.8073845
DO - 10.1109/DESEC.2017.8073845
M3 - Conference contribution
AN - SCOPUS:85039911423
T3 - 2017 IEEE Conference on Dependable and Secure Computing
SP - 181
EP - 187
BT - 2017 IEEE Conference on Dependable and Secure Computing
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 IEEE Conference on Dependable and Secure Computing
Y2 - 7 August 2017 through 10 August 2017
ER -