Abstract

Model building attack on Physical Unclonable Functions (PUFs) by using machine learning (ML) techniques has been a focus in the PUF research area. PUF is a hardware security primitive which can extract unique hardware characteristics (i.e., device-specific) by exploiting the intrinsic manufacturing process variations during integrated circuit (IC) fabrication. The nature of the manufacturing process variations which is random and complex makes a PUF realistically and physically impossible to clone atom-by-atom. Nevertheless, its function is vulnerable to model-building attacks by using ML techniques. Arbiter-PUF is one of the earliest proposed delay-based PUFs which is vulnerable to ML-attack. In the past, several techniques have been proposed to increase its resiliency, but often has to sacrifice the reproducibility of the Arbiter-PUF response. In this paper, we propose a new derivative of Arbiter-PUF which is called Mixed Arbiter-PUF (MA-PUF). Four Arbiter-PUFs are combined and their outputs are multiplexed to generate the final response. We show that MA-PUF has good properties of uniqueness, reliability, and uniformity. Moreover, the resilient of MA-PUF against ML-attack is 15% better than a conventional Arbiter-PUF. The predictability of MA-PUF close to 65% could be achieved when combining with challenge permutation technique.

Highlights

  • Nowadays, trusted and secured computing solutions are crucially demanding especially with the emergence of the Internet of Things (IoT)

  • The notion of Physical Unclonable Functions (PUFs) has been introduced as a promising hardware security primitive which can provide root-of-trust by extracting unique hardware characteristics

  • We have proposed a new architecture for a PUF, known as Mixed Arbiter-PUF (MA-PUF) which is derived from a conventional Arbiter-PUF and Double ArbiterPUF (DA-PUF)

Read more

Summary

Introduction

Nowadays, trusted and secured computing solutions are crucially demanding especially with the emergence of the Internet of Things (IoT). For any computing systems which dealing with sensitive and user-specific data, the trustworthiness of the whole computing system is very important to avoid loss of privacy which can be realized by providing root-of-trust from the hardware layer. Physical Unclonable Function (PUF) is an innovative technology that able to extract hardware characteristics and manifest them as device-specific responses that can be used as root-of-trust in trusted computing. The intrinsic manufacturing process variations during integrated circuit (IC) fabrication are exploited by PUF such that it can map a set of challenges to a set of responses, uniquely for each PUF instance. As PUFs can generate unique CRPs based on hardware characteristics, PUFs can be used to provide a secure, reliable and trustworthy root-of-trust to any computing systems. Arbiter-PUF exploits the logic delay and interconnects variations due to limitations during IC fabrication processes. SR-latch is used as an arbiter since it offers fair arbitration from its symmetric circuit topology [15]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call