You are looking at a specific version 20210428:075533 of this paper. See the latest version.

Paper 2021/555

Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited

Nils Wisiol and Khalid T. Mursi and Jean-Pierre Seifert and Yu Zhuang

Abstract

By revisiting recent neural-network based modeling attacks on XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs and Interpose PUFs can be attacked faster, up to larger security parameters, and with orders of magnitude fewer challenge-response pairs than previously known. To support our claim, we discuss the differences and similarities of recently proposed modeling attacks and offer a fair comparison of the performance of these attacks by implementing all of them using the popular machine learning framework Keras and comparing their performance against the well-studied Logistic Regression attack. Our findings show that neural-network-based modeling attacks have the potential to outperform traditional modeling attacks on PUFs and must hence become part of the standard toolbox for PUF security analysis; the code and discussion in this paper can serve as a basis for the extension of our results to PUF designs beyond the scope of this work.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint. MINOR revision.
Keywords
Physical Unclonable FunctionStrong PUFsMachine LearningModeling AttacksXOR Arbiter PUF
Contact author(s)
mail @ nils-wisiol de
History
2022-06-20: revised
2021-04-28: received
See all versions
Short URL
https://ia.cr/2021/555
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.