Paper 2020/1031

Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification

Yang Yu, Michail Moraitis, and Elena Dubrova

Abstract

In this paper we show that deep learning can be used to identify the shape of power traces corresponding to the responses of a protected arbiter PUF implemented in FPGAs. To achieve that, we combine power analysis with bitstream modification. We train a CNN classifier on two 28nm XC7 FPGAs implementing 128-stage arbiter PUFs and then classify the responses of PUFs from two other FPGAs. We demonstrate that it is possible to reduce the number of traces required for a successful attack to a single trace by modifying the bitstream to replicate PUF responses.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
Profiled attackdeep learningside-channel analysisbitstream modification and arbiter PUF
Contact author(s)
yang11 @ kth se
History
2020-08-27: received
Short URL
https://ia.cr/2020/1031
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1031,
      author = {Yang Yu and Michail Moraitis and Elena Dubrova},
      title = {Profiled Deep Learning Side-Channel Attack on a Protected Arbiter {PUF} Combined with Bitstream Modification},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/1031},
      year = {2020},
      url = {https://eprint.iacr.org/2020/1031}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.