DocumentCode :
740888
Title :
On the Pitfalls of Using Arbiter-PUFs as Building Blocks
Author :
Becker, Georg T.
Author_Institution :
Horst Gortz Inst. for IT Security, Ruhr Univ. Bochum, Bochum, Germany
Volume :
34
Issue :
8
fYear :
2015
Firstpage :
1295
Lastpage :
1307
Abstract :
Physical unclonable functions (PUFs) have emerged as a promising solution for securing resource-constrained embedded devices such as RFID tokens. PUFs use the inherent physical differences of every chip to either securely authenticate the chip or generate cryptographic keys without the need of nonvolatile memory. However, PUFs have shown to be vulnerable to model building attacks if the attacker has access to challenge and response pairs. In these model building attacks, machine learning is used to determine the internal parameters of the PUF to build an accurate software model. Nevertheless, PUFs are still a promising building block and several protocols and designs have been proposed that are believed to be resistant against machine learning attacks. In this paper, we take a closer look at two such protocols, one based on reverse fuzzy extractors and one based on pattern matching. We show that it is possible to attack these protocols using machine learning despite the fact that an attacker does not have access to direct challenge and response pairs. The introduced attacks demonstrate that even highly obfuscated responses can be used to attack PUF protocols. Hence, this paper shows that even protocols in which it would be computationally infeasible to compute enough challenge and response pairs for a direct machine learning attack can be attacked using machine learning.
Keywords :
asynchronous circuits; cryptography; fuzzy set theory; learning (artificial intelligence); pattern matching; protocols; radiofrequency identification; random-access storage; PUF protocol; RFID token; arbiter-PUF; building block; chip authentication; cryptographic key; machine learning; model building attack; nonvolatile memory; pattern matching; physical unclonable function; radiofrequency identification; resource-constrained embedded device; response pair; reverse fuzzy extractor; Authentication; Buildings; Computational modeling; Delays; Error correction codes; Protocols; Evolution Strategies; Evolution strategies (ES); Machine Learning; Physical Unclonable Functions; Reverse Fuzzy Extractor; machine learning; physical unclonable functions (PUFs); reverse fuzzy extractor;
fLanguage :
English
Journal_Title :
Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on
Publisher :
ieee
ISSN :
0278-0070
Type :
jour
DOI :
10.1109/TCAD.2015.2427259
Filename :
7096998
Link To Document :
بازگشت