You are looking at a specific version 20171219:143126 of this paper. See the latest version.

Paper 2017/1134

Machine Learning Attacks on PolyPUF, OB-PUF, RPUF, and PUF-FSM

Jeroen Delvaux

Abstract

A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence facilitates the authentication of any given device in a population of identically laid-out silicon chips, similar to the biometric authentication of a human. The focus and novelty of this work is the development of efficient impersonation attacks on the following four PUF-based authentication protocols: (1) the so-called PolyPUF protocol of Konigsmark, Chen, and Wong, as published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems in 2016, (2) the so-called OB-PUF protocol of Gao, Li, Ma, Al-Sarawi, Kavehei, Abbott, and Ranasinghe, as presented at the IEEE conference PerCom 2016, (3) the so-called RPUF protocol of Ye, Hu, and Li, as presented at the IEEE conference AsianHOST 2016, and (4) the so-called PUF–FSM protocol of Gao, Ma, Al-Sarawi, Abbott, and Ranasinghe, as published in the IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems in 2017. The common flaw of all four designs is that the use of lightweight obfuscation logic provides insufficient protection against machine learning attacks.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
physically unclonable functionsentity authenticationmachine learning
Contact author(s)
jeroen delvaux @ esat kuleuven be
History
2019-01-09: last of 5 revisions
2017-11-27: received
See all versions
Short URL
https://ia.cr/2017/1134
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.