• DocumentCode
    174698
  • Title

    Hybrid modeling attacks on current-based PUFs

  • Author

    Kumar, Ravindra ; Burleson, Wayne

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Massachusetts Amherst, Amherst, MA, USA
  • fYear
    2014
  • fDate
    19-22 Oct. 2014
  • Firstpage
    493
  • Lastpage
    496
  • Abstract
    Physically Unclonable Functions have emerged as a possible candidate to replace traditional cryptography. However, majority of the strong PUFs are vulnerable to modeling attacks. In this work, we take a closer look at the possible attacks on one of the strong PUF architectures known as Current-based PUFs, which exploit irregularities in transistor currents to generate unique signatures. We demonstrate that the fault-injection attacks when coupled with a machine learning (ML) algorithm can considerably push the limits of prediction accuracies. Based on simulations, we observed that the stand-alone ML algorithms suffer from error prone CRPs especially for higher length PUFs. In such scenarios, hybrid attacks exploiting the unreliable responses pushed the prediction accuracies up to 99% for higher length Current-based PUF circuits.
  • Keywords
    cryptography; learning (artificial intelligence); cryptography; current-based PUF; error prone CRP; fault-injection attacks; hybrid attacks; machine learning algorithm; modeling attacks; physically unclonable functions; strong PUF architectures; transistor currents; Accuracy; Circuit faults; Integrated circuit modeling; Logic gates; Prediction algorithms; Security; Transistors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Design (ICCD), 2014 32nd IEEE International Conference on
  • Conference_Location
    Seoul
  • Type

    conf

  • DOI
    10.1109/ICCD.2014.6974725
  • Filename
    6974725