A machine learning resistant Arbiter PUFs scheme based on polynomial reconstruction

Physical Unclonable Functions (PUFs) are emerging as an important building block in hardware security. It has been widely used in key generation and authentication. However, Strong PUFs are vulnerable to the Machine Learning (ML) attack by modeling the challenge-response pairs (CRPs) behavior. The traditional resistant methods based on non-linear blocks (e.g. XOR) have a negative impact on the reliability of Arbiter PUFs (APUFs). In this paper, we proposed a novel error-tolerant countermeasure to resist this attack. In our Randomized Arbiter PUFs (R-APUFs) scheme, the mapping of CRPs is randomized based on the unordered feature of points in polynomial reconstruction to meet the randomness requirements of ML resistance. Moreover, the error-tolerant feature of this scheme will improve the reliability of R-APUFs when used in authentication. We exemplified the Evolution Strategy (ES)-based ML attacks on APUFs and R-APUFs. The experimental result indicates that the modeling accuracy can be reduced from over 93% to below 60%, the percentage of authentication success based on R-APUFs in 1000 tests is 100%. Therefore, this scheme can be a good supplement for the existing ML resistance work.

[1]  Srinivas Devadas,et al.  Controlled physical random functions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[2]  Jan Sölter,et al.  Power and Timing Side Channels for PUFs and their Efficient Exploitation , 2013, IACR Cryptol. ePrint Arch..

[3]  Ulrich Rührmair,et al.  Combined Modeling and Side Channel Attacks on Strong PUFs , 2013, IACR Cryptol. ePrint Arch..

[4]  Sandip Kundu,et al.  Machine learning resistant strong PUF: Possible or a pipe dream? , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[5]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[6]  Srinivas Devadas,et al.  PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Mitsugu Iwamoto,et al.  Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants , 2016, IWSEC.

[8]  Bing Li,et al.  A dynamic PUF anti-aging authentication system based on restrict race code , 2015, Science China Information Sciences.

[9]  Jeroen Delvaux,et al.  Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[10]  Srinivas Devadas,et al.  Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines , 2014, IACR Cryptol. ePrint Arch..

[11]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[12]  Li Bing,et al.  A Dynamic Reseeding DRBG Based on SRAM PUFs , 2016 .

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Dawu Gu,et al.  Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[15]  Srinivas Devadas,et al.  Modeling attacks on physical unclonable functions , 2010, CCS '10.