Design of Robust, High-Entropy Strong PUFs via Weightless Neural Network

Physically unclonable functions (PUFs) have been explored as lightweight hardware primitives for the purpose of realizing robust security via strong authentication or secure key/ID generation. PUF harness manufacturing process variations for the purpose of generating binary keys or binary functions. An ideal strong PUF is a binary function that maps an m-bit input challenge to an uniquen-bit output response, making it attractive for authentication applications. Unfortunately, real strong PUF implementations suffer from reliability issues where the same challenge may produce different responses in the presence of noise. To overcome this problem, strong PUF leverages the availability of exponential number of challenge-response pairs (CRPs). A successful authentication event requires acquiring multiple CRPs and applying a threshold. In contrast, weak PUFs produce limited keys and are required to be highly reliable. Multiple techniques have been developed to achieve the necessary reliability. An additional prerequisite for strong PUFs is resilience against model-building attacks (cloning) by an adversary, who has observed a few CRPs, to prevent successful prediction of future CRPs. In this work, we first illustrate a strong PUF design that re-purposes a weightless neural network (WNN). Second, we showcase the robustness of WNN-based strong PUFs with respect to machine learning attacks, while providing desirable uniqueness and reliability metrics. Finally, we employ an initial entropy source of highly reliable weak PUF bits mapped to weightless neural networks (WNNs) for the purpose of creating a near-ideal strong PUF in terms of reliability. Our results show that it is possible to create highly reliable WNN–based strong PUFs with < 65 % ML accuracy by using as few as 32 initial reliable weak PUF bits.

[1]  Wayne P. Burleson,et al.  Hybrid modeling attacks on current-based PUFs , 2014, 2014 IEEE 32nd International Conference on Computer Design (ICCD).

[2]  Michael Orshansky,et al.  Novel strong PUF based on nonlinearity of MOSFET subthreshold operation , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[3]  Srinivas Devadas,et al.  Modeling attacks on physical unclonable functions , 2010, CCS '10.

[4]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[5]  Sandip Kundu,et al.  On Improving Reliability of SRAM-Based Physically Unclonable Functions , 2017 .

[6]  Sandip Kundu,et al.  Peer pressure on identity: On requirements for disambiguating PUFs in noisy environment , 2017, 2017 IEEE North Atlantic Test Workshop (NATW).

[7]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[8]  Daniel E. Holcomb,et al.  Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM , 2014, IACR Cryptol. ePrint Arch..

[9]  Giovanni De Micheli,et al.  A lightweight cryptographic system for implantable biosensors , 2014, 2014 IEEE Biomedical Circuits and Systems Conference (BioCAS) Proceedings.

[10]  Swaroop Ghosh,et al.  Design and analysis of novel SRAM PUFs with embedded latch for robustness , 2015, Sixteenth International Symposium on Quality Electronic Design.

[11]  Leyla Nazhandali,et al.  Circuit-level approach to improve the temperature reliability of Bi-stable PUFs , 2014, Fifteenth International Symposium on Quality Electronic Design.

[12]  Ken Mai,et al.  A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement , 2013, CHES.

[13]  Ingrid Verbauwhede,et al.  Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs , 2009, CHES.

[14]  Marten van Dijk,et al.  A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).

[15]  Sandip Kundu,et al.  A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[16]  Sandip Kundu,et al.  Realizing strong PUF from weak PUF via neural computing , 2017, 2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT).

[17]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[18]  Himanshu Kaul,et al.  16.2 A 0.19pJ/b PVT-variation-tolerant hybrid physically unclonable function circuit for 100% stable secure key generation in 22nm CMOS , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).

[19]  Mark Mohammad Tehranipoor,et al.  Bit selection algorithm suitable for high-volume production of SRAM-PUF , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[20]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[21]  Ken Mai,et al.  An efficient reliable PUF-based cryptographic key generator in 65nm CMOS , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[22]  Wayne P. Burleson,et al.  Side-Channel Assisted Modeling Attacks on Feed-Forward Arbiter PUFs Using Silicon Data , 2015, RFIDSec.

[23]  Dawu Gu,et al.  Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[24]  Daniel E. Holcomb,et al.  Improving reliability of weak PUFs via circuit techniques to enhance mismatch , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[25]  Wayne P. Burleson,et al.  On design of a highly secure PUF based on non-linear current mirrors , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[26]  Ingrid Verbauwhede,et al.  PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator , 2012, CHES.

[27]  I. Aleksander,et al.  WISARD·a radical step forward in image recognition , 1984 .

[28]  Ahmad-Reza Sadeghi,et al.  Efficient Helper Data Key Extractor on FPGAs , 2008, CHES.

[29]  Ingrid Verbauwhede,et al.  A soft decision helper data algorithm for SRAM PUFs , 2009, 2009 IEEE International Symposium on Information Theory.

[30]  R. Chau,et al.  A 45nm Logic Technology with High-k+Metal Gate Transistors, Strained Silicon, 9 Cu Interconnect Layers, 193nm Dry Patterning, and 100% Pb-free Packaging , 2007, 2007 IEEE International Electron Devices Meeting.

[31]  Wayne P. Burleson,et al.  Hybrid side-channel/machine-learning attacks on PUFs: A new threat? , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[32]  Roel Maes,et al.  An Accurate Probabilistic Reliability Model for Silicon PUFs , 2013, CHES.

[33]  Sandip Kundu,et al.  Machine learning resistant strong PUF: Possible or a pipe dream? , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).