打破区间PUF的子空间预学习策略

ID:39287

阅读量:0

大小:0.48 MB

页数:10页

时间:2023-03-14

金币:2

上传者:战必胜

 
Citation: Li, G.; Mursi, K.T. A
Subspace Pre-Learning Strategy to
Break the Interpose PUF. Electronics
2022, 11, 1049. https://doi.org/
10.3390/electronics11071049
Academic Editor: Cheng-Chi Lee
Received: 8 March 2022
Accepted: 26 March 2022
Published: 27 March 2022
Publishers Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
electronics
Article
A Subspace Pre-Learning Strategy to Break the Interpose PUF
Gaoxiang Li
1,
* and Khalid T. Mursi
2
1
Department of Computer Science, Texas Tech University, Lubbock, TX 79709, USA
2
Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah,
Jeddah 21959, Saudi Arabia; kmursi@uj.edu.sa
* Correspondence: gaoli@ttu.edu
Abstract:
Physical Unclonable Functions (PUFs) are promising security primitives for resource-
constrained IoT devices. A critical aspect of PUF security research is to identify all potential security
risks. This information about vulnerabilities is beneficial for both PUF developers and PUF-using
application developers in terms of designing new PUFs to mitigate existing risks and avoid vulnerable
PUFs. Recently, a PUF structure called Interpose PUF (IPUF) was proposed, which claims to be
resistant to reliability attacks and machine learning modeling attacks. Related studies on this secure
PUF design have demonstrated that some IPUFs can still be broken, but large IPUFs may remain
secure against all known modeling attacks. In addition, all these studies either focus on plain
challenge–response pair attacks or require prior knowledge of IPUF architecture implementation.
However, depending on the claim of attack resistance to reliability attacks, we can employ a different
attack approach to break IPUFs. In this paper, we describe a subspace pre-learning-based attack
method that can rapidly and accurately break the IPUFs that were treated as secure in the earlier
study, revealing a vulnerability in IPUFs if the open interface conforms to the way challenge–response
data are accessed by the subspace pre-learning-based attack method.
Keywords:
IoT security; physical unclonable function; interpose PUF; machine learning
modeling attack
1. Introduction
The Internet of Things (IoT) has wide and deep participation in business and everyday
life. With the exponential rise of IoT requirements, communication security has attracted
increased attention [
1
]. However, considering most traditional cryptographic techniques,
which require persistent memory to achieve the desired level of security, many IoT devices
are resource-constrained and cannot support traditional cryptographic protocols [
2
,
3
]. Phys-
ical Unclonable Functions (PUFs) were proposed as a potential replacement for classical
cryptography in IoT devices [
4
6
], leveraging small physical variations of a small number
of transistors to produce responses unique to the individual circuit. Because of their low
resource requirements, PUFs are excellent candidates for hardware primitives that can be
utilized to construct security protocols on network nodes with limited resources.
However, before adopting PUFs as a trusted security function, they must be examined
to identify all possible security vulnerabilities, such as vulnerabilities to machine learning
(ML) modeling attacks [
7
10
] and reliability-based attacks [
11
,
12
]. In machine learning
modeling attacks, the attacker eavesdrops on-air packets between IoTs in order to collect
enough plain challenge–response pairs (CRPs) to build a model. Then, the attacker inputs
the collected challenges, as features, and responses, as class labels, into an ML model
targeted at having a learned model for future response prediction. In reliability-based
attacks, the attacker applies pre-set challenges to the PUF with an open interface and
collects specific CRPs. Furthermore, CRPs obtained through freely queried can be easily
used to break PUFs by utilizing the reliability information of these CRPs.
Interpose PUF (IPUF) is proposed by Nguyen et al., [
13
] to mitigate the two above-
mentioned classes of attack. Studies in [
8
,
13
] show IPUFs could withstand various existing
Electronics 2022, 11, 1049. https://doi.org/10.3390/electronics11071049 https://www.mdpi.com/journal/electronics
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭