Paper 2020/957
Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs
Johannes Tobisch, Anita Aghaie, and Georg T. Becker
Abstract
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a lightweight alternative to classical cryptography for purposes such as device authentication. Most of the proposed candidates, however, have been plagued by machine-learning attacks breaking their security claims. The Interpose PUF (iPUF), which has been introduced at CHES 2019, was explicitly designed with state-of-the-art machine-learning attacks in mind and is supposed to be impossible to break by classical and reliability attacks. In this paper, we analyze its vulnerability to reliability attacks. Despite the increased difficulty, these attacks are still feasible, against the original authors’ claim. We explain how adding constraints to the machine-learning objective streamlines reliability attacks and allows us to model all individual components of an iPUF successfully. In order to build a practical attack, we give several novel contributions. First, we demonstrate that reliability attacks can be performed not only with CMA-ES but also with gradient-based optimization. Second, we show that the switch to gradient-based reliability attacks makes it possible to combine reliability attacks, weight constraints, and Logistic Regression (LR) into a single optimization objective. This framework makes machine-learning attacks more efficient, as it exploits knowledge of responses and reliability information at the same time. Third, we show that a differentiable model of the iPUF exists and how it can be utilized in a combined reliability attack. We confirm that iPUFs are harder to break than regular XOR Arbiter PUFs. However, we are still able to break (1,10)-iPUF instances, which were originally assumed to be secure, with less than 10^7 PUF response queries.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Preprint. MINOR revision.
- Keywords
- Physical Unclonable FunctionReliability AttackLR AttackInterpose PUFGradient-based Reliability Attack
- Contact author(s)
-
johannes tobisch @ csp mpg de
anita aghaie @ rub de
georg becker @ rub de - History
- 2020-10-15: revised
- 2020-08-11: received
- See all versions
- Short URL
- https://ia.cr/2020/957
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/957, author = {Johannes Tobisch and Anita Aghaie and Georg T. Becker}, title = {Combining Optimization Objectives: New Machine-Learning Attacks on Strong {PUFs}}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/957}, year = {2020}, url = {https://eprint.iacr.org/2020/957} }