Filters








78 Hits in 11.9 sec

The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks

Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten Van Dijk
2019 Transactions on Cryptographic Hardware and Embedded Systems  
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, and which possesses a rigorous security argument, has been a fundamental problem in PUF research since  ...  In this paper, we introduce the novel Interpose PUF (iPUF) design, and rigorously prove its security against all known machine learning (ML) attacks, including any currently known reliability-based strategies  ...  Ulrich Rührmair gratefully acknowledges funding by the PICOLA project of the German Bundesministerium für Bildung und Forschung (BMBF).  ... 
doi:10.13154/tches.v2019.i4.243-290 dblp:journals/tches/NguyenSJMRD19 fatcat:dz4sttvaezalnbfbw5t5xojhje

Machine Learning Attacks and Countermeasures for PUF-Based IoT Edge Node Security

Vishalini R. Laguduva, Srinivas Katkoori, Robert Karam
2020 SN Computer Science  
We present a novel non-invasive, architecture-independent, machine learning attack for robust PUF designs and can handle encryption and obfuscation-based security measures on the transmitted challenge  ...  Physically unclonable functions (PUFs) have emerged as a lightweight, viable security protocol in the Internet of Things (IoT) framework.  ...  Related Work In this section, we briefly summarize related work on machine learning-based attack and prevention techniques in the strong PUF design.  ... 
doi:10.1007/s42979-020-00303-y fatcat:6flbzxxvnnag5dmt4fi3qo64vi

Hybrid side-channel/machine-learning attacks on PUFs: A new threat?

Xiaolin Xu, Wayne Burleson
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014  
Machine Learning (ML) is a well-studied strategy in modeling Physical Unclonable Functions (PUFs) but reaches its limits while applied on instances of high complexity.  ...  To better understand the side-channel attacks on PUFs, three different methodologies of implementing side-channel attacks are compared.  ...  The entire XOR Arbiter PUF and Lightweight PUF are attacked as long as each sub-PUF is learned.  ... 
doi:10.7873/date.2014.362 dblp:conf/date/XuB14 fatcat:y6cejvtoczg4vf3jisiupdvppm

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
Numerous newly revealed flaws and attacks are presented throughout this thesis. On the bright side, the lessons learned can help improve the quality of future PUF-based systems.  ...  PUFs can augment the security architecture of an ever-increasing number of electronic devices that access our personal data and/or represent our identities.  ...  Acknowledgements The authors acknowledge that the responses of a PUF are noisy and mention the existence of fuzzy extractors [39] as well.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq

BIST-PUF: Online, hardware-based evaluation of physically unclonable circuit identifiers

Siam U. Hussain, Sudha Yellapantula, Mehrdad Majzoobi, Farinaz Koushanfar
2014 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)  
Proof-of-concept implementation of the BIST-PUF in FPGA demonstrates its low overhead, effectiveness, and practicality.  ...  This paper presents BIST-PUF, the first built-in-self-test (BIST) methodology for online evaluation of weak and strong PUFs.  ...  Another important advantage of SlenderPUF protocol is that it increases the PUF's resistance against remote machine learning attacks.  ... 
doi:10.1109/iccad.2014.7001347 dblp:conf/iccad/HussainYMK14 fatcat:grtpjrvrrbh6la27s5qvviblre

Splitting the Interpose PUF: A Novel Modeling Attack Strategy

Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten Van Dijk, Ulrich Rührmair
2020 Transactions on Cryptographic Hardware and Embedded Systems  
The attacks build on a new divide-and-conquer approach that allows us to model the two building blocks of the Interpose PUF separately.  ...  We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by novel machine learning strategies up  ...  of the Divide-and-Conquer attack presented in this work.  ... 
doi:10.13154/tches.v2020.i3.97-120 dblp:journals/tches/WisiolMPNMSDR20 fatcat:wbw6aenbbbcazddal4dfp47nuu

Combining Optimization Objectives: New Modeling Attacks on Strong PUFs

Johannes Tobisch, Anita Aghaie, Georg T. Becker
2021 Transactions on Cryptographic Hardware and Embedded Systems  
The Interpose PUF (iPUF), which has been introduced at CHES 2019, was explicitly designed with state-of-the-art modeling attacks in mind and is supposed to be impossible to break by classical and reliability  ...  Most of the proposed candidates, however, have been plagued by modeling attacks breaking their security claims.  ...  Acknowledgments The work described in this paper has been supported in part by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -EXC 2092 CASA -  ... 
doi:10.46586/tches.v2021.i2.357-389 fatcat:nrdphniczresbcm7idk7gvprma

Inconsistency of Simulation and Practice in Delay-based Strong PUFs

Anita Aghaie, Amir Moradi
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Such a combat motivated the atmosphere of open research, hence enhancing PUF designs in the presence of Machine Learning (ML) attacks.  ...  As an example of this controversy, at CHES 2019, a novel delay-based PUF (iPUF) has been introduced and claimed to be resistant against various ML and reliability attacks.  ...  Acknowledgments The work described in this paper has been supported in part by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -EXC 2092 CASA.  ... 
doi:10.46586/tches.v2021.i3.520-551 fatcat:5sijtzuvuncnbkm6mpuvhdpaku

Physically Unclonable Functions and AI: Two Decades of Marriage [article]

Fatemeh Ganji, Shahin Tajik
2021 arXiv   pre-print
The main focus here is to explore the methods borrowed from AI to assess the security of a hardware primitive, namely physically unclonable functions (PUFs), which has found applications in cryptographic  ...  Such a connection between AI and software security has been confirmed and well-reviewed in the relevant literature.  ...  Acknowledgements We are deeply grateful for the guidance and support of our Ph.D. advisor, Jean-Pierre Seifert.  ... 
arXiv:2008.11355v2 fatcat:jxt5iueznzhqlmbcsbbgu3kzua

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication [article]

Jiliang Zhang, Haihan Su
2018 arXiv   pre-print
In this paper, machine learning (ML)-based modeling attacks to break such authentication is presented.  ...  Experimental results show that ANN, RNN and CMA-ES can clone the challenge-response behavior of VOS-based authentication with up to 99.65% predication accuracy, while the predication accuracy is less than  ...  Since the current output in VOLtA is related to the current input and the previous input, the input of the model is adjusted to learn the effective mapping between input and output.  ... 
arXiv:1807.07737v2 fatcat:crfu77dno5bmlizddg6k3rbwja

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities

Weiqiang Liu, Chongyan Gu, Maire O'Neill, Gang Qu, Paolo Montuschi, Fabrizio Lombardi
2020 Proceedings of the IEEE  
Figure 19 : An example of the application of machine learning to SCA. Approximate computing can be used to accelerate the machine learning process and improve the attack efficiency.  ...  Approximate Computing for Machine Learning Based Security 1) Side Channel Analysis (SCA) of Cryptographic Algorithms: In recent years, machine learning techniques have been used to improve SCA attacks  ... 
doi:10.1109/jproc.2020.3030121 fatcat:vgxrxqkoibhgflrwq6rrfz7ofm

Low-power emerging memristive designs towards secure hardware systems for applications in internet of things

Nan Du, Heidemarie Schmidt, Ilia Polian
2021 Nano Materials Science  
Hardware security primitives Machine learning-related attacks and defenses A B S T R A C T Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory  ...  computing, their application-level impacts on the novel implementations of secret key generation, crypto functions and machine learning attacks are explored, respectively.  ...  N.D. and H.S. acknowledges the funding by the Fraunhofer Internal Programs under Grant No. Attract 600768. We are thankful to two anonymous reviewers for their constructive feedback.  ... 
doi:10.1016/j.nanoms.2021.01.001 fatcat:ellxqwgigvfizbtkgqznvpat44

Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security

Wenye Liu, Chip-Hong Chang, Xueyang Wang, Chen Liu, Jason Fung, Mohammad Ebrahimabadi, Naghmeh Karimi, Xingyu Meng, Kanad Basu
2021 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
The last decade has witnessed remarkable research advances at the intersection of machine learning (ML) and hardware security.  ...  Accordingly, due to the opportunities of ML-assisted security and the vulnerabilities of ML implementation, in this paper, we will survey the applications, vulnerabilities and fortification of ML from  ...  HARDWARE SECURITY OF MACHINE LEARNING A.  ... 
doi:10.1109/jetcas.2021.3084400 fatcat:c4wdkghpo5fwbhvkekaysnahzm

Emerging Physical Unclonable Functions With Nanotechnology

Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott
2016 IEEE Access  
An important feature of a PUF is the reliance on minute random variations in the fabricated hardware to derive a trusted random key.  ...  Physical Unclonable Functions (PUFs) are increasingly used for authentication and identification applications as well as cryptographic key generation.  ...  DA acknowledges funding from the Australian Research Council Future Fellowship scheme (FT100100585). The authors also appreciate sponsorship from the China Scholarship Council (201306070017).  ... 
doi:10.1109/access.2015.2503432 fatcat:3x4sayz2draqxbbd6aubrnn4uy

Towards Intelligent Context-Aware 6G Security [article]

André N. Barreto, Stefan Köpsell, Arsenia Chorti, Bertram Poettering, Jens Jelitto, Julia Hesse, Jonathan Boole, Konrad Rieck, Marios Kountouris, Dave Singelee, Kumar Ashwinee
2021 arXiv   pre-print
The premise of this roadmap is that sensing and advanced AI will enable context awareness, which in turn can drive intelligent security mechanisms, such as adaptation and automation of security controls  ...  The path towards this vision and some of the challenges along the way are discussed in this contribution.  ...  , PUFs from context Provable / quantifiable security, lightweight and lowlatency hybrid PLS-crypto that adapts to PHY context explainability and fairness of ML ML to the security domain Adaptive security  ... 
arXiv:2112.09411v1 fatcat:ynadpp5oobh4dpmz7ku2tgaklu
« Previous Showing results 1 — 15 out of 78 results