80 Hits in 9.4 sec

A noise bifurcation architecture for linear additive physical functions

Meng-Day Yu, David M'Raihi, Ingrid Verbauwhede, Srinivas Devadas
2014 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)  
We present supporting data using 28nm FPGA PUF noise results as well as machine learning attack results.  ...  We demonstrate that our architecture can also withstand recent side-channel attacks that filter the noise (to clean up training challenge/response labels) prior to machine learning.  ...  MACHINE LEARNING AND NOISE A. Learning With Noise In our context, the purpose of machine learning is to predict the response to a previously unseen (and randomly chosen) challenge.  ... 
doi:10.1109/hst.2014.6855582 dblp:conf/host/YuMVD14 fatcat:ypcshivzw5g7fmvkol47v2oniu

A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication

Meng-Day Yu, Matthias Hiller, Jeroen Delvaux, Richard Sowell, Srinivas Devadas, Ingrid Verbauwhede
2016 IEEE Transactions on Multi-Scale Computing Systems  
The adversary is faced with the problem of deriving a PUF model with a limited amount of machine learning training data.  ...  resources, e.g., the number of CRPs and the attack runtime, using recent results based on the probably-approximately-correct (PAC) complexity-theoretic framework.  ...  ACKNOWLEDGEMENT This work was partly funded by the Bavaria California Technology Center (BaCaTeC) through grant number 2014-1/9.  ... 
doi:10.1109/tmscs.2016.2553027 fatcat:hnrh7rptevgdvg5nzyne6n73o4

Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review

Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Pascal Urien
2021 Sensors  
Furthermore, the secrecy of the machine learning models used for PUFs and the scenario of leakage of sensitive information to an adversary due to an insider threat within the organization have not been  ...  The use of machine learning PUF models has been recently proposed to authenticate the IoT objects while reducing the storage space requirement for each device.  ...  Noise Bifurcation Protocol The noise bifurcation protocol was introduced in the work of Yu et al. [31] to present a novel response hiding technique.  ... 
doi:10.3390/s21248415 pmid:34960505 pmcid:PMC8705400 fatcat:7ohf7f2wtff7hfw47yermshioa

Combining Optimization Objectives: New Modeling Attacks on Strong PUFs

Johannes Tobisch, Anita Aghaie, Georg T. Becker
2021 Transactions on Cryptographic Hardware and Embedded Systems  
The Interpose PUF (iPUF), which has been introduced at CHES 2019, was explicitly designed with state-of-the-art modeling attacks in mind and is supposed to be impossible to break by classical and reliability  ...  Third, we show that a differentiable model of the iPUF exists and how it can be utilized in a combined reliability attack. We confirm that iPUFs are harder to break than regular XOR Arbiter PUFs.  ...  Acknowledgments The work described in this paper has been supported in part by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -EXC 2092 CASA -  ... 
doi:10.46586/tches.v2021.i2.357-389 fatcat:nrdphniczresbcm7idk7gvprma

A Survey on Lightweight Entity Authentication with Strong PUFs

Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
2015 ACM Computing Surveys  
In this work, we review nineteen proposals in chronological order: from the original strong PUF proposal (2001) to the more complicated noise bifurcation and system of PUF proposals (2014).  ...  The protocol proposals are typically accompanied with two PUF promises: lightweight and an increased resistance against physical attacks.  ...  For weak PUFs, this directly corresponds with a characterization of the secret. For strong PUFs, an additional machine learning step might be required for the attack to be successful.  ... 
doi:10.1145/2818186 fatcat:lzn6sb3g55a5rkdmunilfz3wtq

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
Numerous newly revealed flaws and attacks are presented throughout this thesis. On the bright side, the lessons learned can help improve the quality of future PUF-based systems.  ...  To facilitate the registration of unique features, a so-called physically unclonable function (PUF) can be implemented on the IC.  ...  Moreover, the authors do not suggest the use of a particular strong PUF. A method to expand its usually single-bit response r into a long string x is not suggested either.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq

Machine Learning of Physical Unclonable Functions using Helper Data

Emanuele Strieder, Christoph Frisch, Michael Pehl
2021 Transactions on Cryptographic Hardware and Embedded Systems  
While the shown vulnerability advances Machine Learning (ML) towards realistic attacks on key-storage systems with PUFs, our analysis also facilitates a better understanding and evaluation of existing  ...  bits suffices to reduce the entropy of the key down to one bit.  ...  Acknowledgements This work was partly funded by the German Ministry of Education, Research and Technology through the project SecForCARs (grant number 16KIS0795).  ... 
doi:10.46586/tches.v2021.i2.1-36 fatcat:5alolkueozghfp6tasykm2pf6y

Table of contents

2017 2017 IEEE International Symposium on Circuits and Systems (ISCAS)  
Mechanisms of Different Countermeasures Against Side-Channel Attacks TECHNICAL SESSIONS -TUESDAY, MAY 30 THINVITED: Using Machine Learning to Separate SignalsAccelerating Convolutional Neural Network  ...  FOR DOMESTIC ORGANIC GARDEN A MAN-MACHINE INTERACTION SYSTEM BASED ON EEG, EOG AND MACHINE LEARNING SMART PET CLOTHING: GUARDIAN OF HEALTH AND MOOD **CASS Student Design Competition posters/demos will  ... 
doi:10.1109/iscas.2017.8049750 fatcat:csazlovzq5g4bmzlf7uss65sy4

A Modeling Attack Resistant Deception Technique for Securing Lightweight-PUF based Authentication

Chongyan Gu, Chip-Hong Chang, Weiqiang Liu, Shichao Yu, Yale Wang, Maire OrNeill
2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Our scheme uses an active deception protocol to prevent machine learning (ML) attacks on a device with a monolithic integration of a genuine Strong PUF (SPUF), a fake PUF, a pseudo random number generator  ...  His research interests mainly include physical unclonable functions (PUFs), machine learning based modeling attacks on PUFs and countermeasures.  ... 
doi:10.1109/tcad.2020.3036807 fatcat:mmffbdfnofcp3jrsyrn4wyxk6e

PUF Based Authentication Protocol for IoT

An Braeken
2018 Symmetry  
Physical Unclonable Functions (PUFs) on a device represent a low cost primitive exploiting the unique random patterns in the device and have been already applied in a multitude of applications for secure  ...  key generation and key agreement in order to avoid an attacker to take over the identity of a tampered device, whose key material has been extracted.  ...  [14, 15] also take countermeasures to offer resistance against machine learning attacks, although they cannot be completely excluded [13] .  ... 
doi:10.3390/sym10080352 fatcat:xlwby35vpvbpleflecmnv4mt2a

An Energy-Efficient Current-Starved Inverter Based Strong Physical Unclonable Function with Enhanced Temperature Stability

Yuan Cao, Wenhan Zheng, Xiaojin Zhao, Chip-Hong Chang
2019 IEEE Access  
As burgeoning hardware security primitive, physical unclonable function (PUF) has aroused the interest of solid-state circuit community on its efficient integration into security-critical applications.  ...  By limiting the drain currents of CS-inverters to achieve ZTC, the power consumption of the proposed PUF is also reduced substantially.  ...  Strong PUFs based on linear additive delay architecture are generally vulnerable to machine learning attacks.  ... 
doi:10.1109/access.2019.2932022 fatcat:6dolly2sqzf5jbg7jvhps2pllu

ISDCS 2021 Technical Program

2021 2021 International Symposium on Devices, Circuits and Systems (ISDCS)  
It is the great pleasure of the entire Organizing Committee to announce the program of the 4th International Symposium on Devices, Circuits and Systems (ISDCS 2021) and to solicit your attendance.  ...  However, with the advent of low-cost technology involving new-generation materials and methods, the TFTs started finding various applications, including gas and light sensing.  ...  Gopi Krishna Saramekala (NIT Calicut) Abstract: A machine learning approach of multivariable non-linear regression with six input variables is used for the first time to assess the process variability  ... 
doi:10.1109/isdcs52006.2021.9397912 fatcat:766wjfco3fe2fgat2i42etyk5q

2020 Index IEEE Transactions on Circuits and Systems I: Regular Papers Vol. 67

2020 IEEE Transactions on Circuits and Systems Part 1: Regular Papers  
Liu, W., +, TCSI Oct. 2020 3484-3497 A Strong Subthreshold Current Array PUF Resilient to Machine Learning Attacks.  ...  ., +, TCSI July 2020 2317-2330 Cryptography A Strong Subthreshold Current Array PUF Resilient to Machine Learning Attacks.  ...  ., +, TCSI Feb. 2020 634-646 Histograms Linearity Theory of Stochastic Phase-Interpolation Time-to-Digital Converter. Gammoh, K., +,  ... 
doi:10.1109/tcsi.2021.3055003 fatcat:kbmst5td2bbvtl7vpbj3knnkri

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Pooja Anand, Yashwant Singh, Arvind Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar
2020 IEEE Access  
However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them.  ...  A detailed taxonomy of attacks associated with various vulnerabilities is also presented in the text.  ...  The review of nascent solutions based on machine learning to cope with growing attacks are discussed in the following sub-sections and shown in FIGURE 12 .  ... 
doi:10.1109/access.2020.3022842 fatcat:ifkplk2lsjhupkt4c42fovqpta

2021 Index IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Vol. 40

2021 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name.  ...  Middleware for Deploying Multiple NN-Based Applications on a Single Machine.  ... 
doi:10.1109/tcad.2021.3136047 fatcat:ppooj4g65nc2zonj7szclerc2y
« Previous Showing results 1 — 15 out of 80 results