2021
DOI: 10.1145/3445978
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures

Abstract: Physical Unclonable Functions (PUFs) exploit the manufacturing process variations inherent in silicon-based chips to generate unique secret keys. Although PUFs are supposed to be unclonable or unbreakable, researchers have found that they are vulnerable to machine learning (ML) attacks. In this article, we analyze the vulnerability of different FPGA-based Ring Oscillator PUFs (ROPUFs) to machine learning attacks. The challenge-response pairs (CRPs) data obtained from different ROPUFs is trained using different… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 32 publications
0
1
0
Order By: Relevance
“…This modeling approach does not require any auxiliary information and solely relies on computations performed on the CRPs themselves [8]. As a consequence, PUFs are susceptible to ML-based attacks [9], especially when CRPs are accessible outside the chip without any protection mechanisms in place. Constructed PUF models can take the form of numerical models derived from collected data or ML models trained on a sufficient number of CRPs [10].…”
Section: A Machine Learning-based Modelingmentioning
confidence: 99%
“…This modeling approach does not require any auxiliary information and solely relies on computations performed on the CRPs themselves [8]. As a consequence, PUFs are susceptible to ML-based attacks [9], especially when CRPs are accessible outside the chip without any protection mechanisms in place. Constructed PUF models can take the form of numerical models derived from collected data or ML models trained on a sufficient number of CRPs [10].…”
Section: A Machine Learning-based Modelingmentioning
confidence: 99%
“…1,[11][12][13][14][15] Machine learning (ML)-based attacks that predict responses for as-of-yet-unseen challenges have become an increasing threat to PUFs of all variants. 5,[16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31] These attacks do not directly represent the transformation between challenges and responses, but rather predict the result of that transformation after learning from a set of CRPs collected from a given PUF. Machine-learning-based attacks, including regression mappings, state vector machines, k-nearest neighbors, random forests, genetic algorithms, artificial neural networks, and generative adversarial networks, have proven effective against various conventional PUFs, and additional work has developed theoretical relationships between the number of CRPs used for training and response prediction accuracy.…”
Section: Introductionmentioning
confidence: 99%