Paper 2017/551

A Fourier Analysis Based Attack against Physically Unclonable Functions

Fatemeh Ganji, Shahin Tajik, and Jean-Pierre Seifert

Abstract

Electronic payment systems have leveraged the advantages offered by the RFID technology, whose security is promised to be improved by applying the notion of Physically Unclonable Functions (PUFs). Along with the evolution of PUFs, numerous successful attacks against PUFs have been proposed in the literature. Among these are machine learning (ML) attacks, ranging from heuristic approaches to provable algorithms, that have attracted great attention. Our paper pursues this line of research by introducing a Fourier analysis based attack against PUFs. More specifically, this paper focuses on two main aspects of ML attacks, namely being provable and noise tolerant. In this regard, we prove that our attack is naturally integrated into a provable Probably Approximately Correct (PAC) model. Moreover, we show that our attacks against known PUF families are effective and applicable even in the presence of noise. Our proof relies heavily on the intrinsic properties of these PUF families, namely arbiter, Ring Oscillator (RO), and Bistable Ring (BR) PUF families. We believe that our new style of ML algorithms, which take advantage of the Fourier analysis principle, can offer better measures of PUF security.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. Financial Cryptography and Data Security 2018
Keywords
Physically Unclonable FunctionsBoolean AnalysisNoise SensitivityLow Degree AlgorithmMachine LearningPAC Learning.
Contact author(s)
fganji @ sec t-labs tu-berlin de
History
2017-11-30: last of 2 revisions
2017-06-08: received
See all versions
Short URL
https://ia.cr/2017/551
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/551,
      author = {Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert},
      title = {A Fourier Analysis Based Attack against Physically Unclonable Functions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2017/551},
      year = {2017},
      url = {https://eprint.iacr.org/2017/551}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.