Abstract
Physical unclonable function (PUF) is a promising security-based primitive, which provides an extremely large number of responses for key generation and authentication applications. Various PUFs have been developed as central building blocks in cryptographic protocols and security architectures, however, the existing PUFs and their improvements are still vulnerable to modeling attacks (MA) with refined machine learning algorithms. In this article, a configurable butterfly delay chain-based PUF design framework is proposed to meet the requirements of randomness, reliability, uniqueness, and MA-resistance metrics. A configurable butterfly delay chain is introduced to create multiple pairs of symmetric paths and a strong PUF relying on the intrinsic delay fluctuations of two identical paths is built. Furthermore, a secure hash function is used to insert non-linearities into the PUF, and a BCH-based error correction algorithm is utilized to recover the actual responses under noisy environments. The proposed PUF is implemented on Xilinx FPGAs and three machine learning algorithms are used to evaluate the resistance against MA. Experimental results show that the randomness, reliability, and uniqueness of the proposed PUF are close to the ideal value (49.6%, 99.9%, and 49.9%, respectively), and the prediction accuracy reaches 50% that indicating a desirable resilient to MA.
- [1] . 2021. Direct anonymous attestation with optimal TPM signing efficiency. IEEE Transactions on Information Forensics and Security 16 (2021), 2260–2275.
DOI: Google ScholarDigital Library - [2] . 2005. Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13, 10 (2005), 1200–1205.
DOI: Google ScholarDigital Library - [3] . 2021. A reconfigurable arbiter MPUF with high resistance against machine learning attack. IEEE Transactions on Magnetics 57, 10 (2021), 1–7.
DOI: Google ScholarCross Ref - [4] . 2018. A multiplexer-based arbiter PUF composition with enhanced reliability and security. IEEE Transactions on Computers 67, 3 (2018), 403–417.
DOI: Google ScholarCross Ref - [5] . 2009. Techniques for design and implementation of secure reconfigurable PUFs. ACM Transactions on Reconfigurable Technology and Systems 2, 1, Article
5 (2009), 33 pages.DOI: Google ScholarDigital Library - [6] . 2015. Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. In Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition. 641–646.Google ScholarDigital Library
- [7] . 2020. Configurable ring oscillator PUF using hybrid logic gates. IEEE Access 8 (2020), 161427–161437.
DOI: Google ScholarCross Ref - [8] . 2007. Physical unclonable functions and public-key crypto for FPGA IP protection. In Proceedings of the 2007 International Conference on Field Programmable Logic and Applications. 189–195.
DOI: Google ScholarCross Ref - [9] . 2021. SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices. IEEE Internet of Things Journal 8, 7 (2021), 5904–5913.
DOI: Google ScholarCross Ref - [10] . 2012. Buskeeper PUFs, a promising alternative to D flip-flop PUFs. In Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust. 7–12.
DOI: Google ScholarCross Ref - [11] . 2016. Evaluation of latch-based PUFs implemented on 40 nm ASICs. In Proceedings of the 2016 4th International Symposium on Computing and Networking. 642–648.
DOI: Google ScholarCross Ref - [12] . 2012. Flash memory for ubiquitous hardware security functions: True random number generation and device fingerprints. In Proceedings of the 2012 IEEE Symposium on Security and Privacy. 33–47.
DOI: Google ScholarDigital Library - [13] . 2020. Lightweight integrated design of PUF and TRNG security primitives based on eFlash memory in 55-nm CMOS. IEEE Transactions on Electron Devices 67, 4 (2020), 1586–1592.
DOI: Google ScholarCross Ref - [14] Intrinsic ID 2023. Physical unclonable function IP. Retrieved January 2023 from https://www.intrinsic-id.com.Google Scholar
- [15] Xilinx 2023. Physically unclonable function in Zynq UltraScale+ devices. Retrieved January 2023 from https://www.xilinx.com.Google Scholar
- [16] . 2021. T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT. IEEE Access 9 (2021), 137384–137405.
DOI: Google ScholarCross Ref - [17] . 2016. An aging-resistant RO-PUF for reliable key generation. IEEE Transactions on Emerging Topics in Computing 4, 3 (2016), 335–348.
DOI: Google ScholarCross Ref - [18] . 2019. A new pay-per-use scheme for the protection of FPGA IP. In Proceedings of the 2019 IEEE International Symposium on Circuits and Systems. 1–5.
DOI: Google ScholarCross Ref - [19] . 2021. An IoT-based anti-counterfeiting system using visual features on QR code. IEEE Internet of Things Journal 8, 8 (2021), 6789–6799.
DOI: Google ScholarCross Ref - [20] . 2009. A comparative analysis of delay based PUF implementations on FPGA. IACR Cryptology ePrint Archive 2009 (
01 2009), 629.Google Scholar - [21] . 2017. A highly reliable butterfly PUF in SRAM-based FPGAs. IEICE Electronics Express 14, 14 (2017), 20170551–20170551.
DOI: Google ScholarCross Ref - [22] . 2008. Extended abstract: The butterfly PUF protecting IP on every FPGA. In Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust. 67–70.
DOI: Google ScholarDigital Library - [23] . 2021. A computationally efficient tensor regression network-based modeling attack on XOR arbiter PUF and its variants. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 40, 6 (2021), 1197–1206.
DOI: Google ScholarCross Ref - [24] . 2021. Introducing recurrence in strong PUFs for enhanced machine learning attack resistance. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11, 2 (2021), 319–332.
DOI: Google ScholarCross Ref - [25] . 2019. Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response. IEEE Transactions on Information Forensics and Security 14, 4 (2019), 1109–1123.
DOI: Google ScholarDigital Library - [26] 2018. Predicting soft-response of MUX PUFs via logistic regression of total delay difference. In Proceedings of the 2018 IEEE International Symposium on Circuits and Systems. 1–5.
DOI: Google ScholarCross Ref - [27] . 2020. Machine learning assisted PUF calibration for trustworthy proof of sensor data in IoT. ACM Transactions on Design Automation of Electronic Systems 25, 4, Article
32 (Jun 2020), 21 pages.DOI: Google ScholarDigital Library - [28] . 2018. SD-PUF: Spliced digital physical unclonable function. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, 5 (2018), 927–940.
DOI: Google ScholarCross Ref - [29] . 2021. CT PUF: Configurable tristate PUF against machine learning attacks for IoT security. IEEE Internet of Things Journal 9, 16 (2021), 1–1.
DOI: Google ScholarCross Ref - [30] . 2004. A technique to build a secret key in integrated circuits for identification and authentication applications. In Proceedings of the 2004 Symposium on VLSI Circuits. 176–179.
DOI: Google ScholarCross Ref - [31] . 2017. Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs. In Proceedings of the 2017 IEEE Conference on Dependable and Secure Computing. 181–187.
DOI: Google ScholarCross Ref - [32] . 2013. PUF modeling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security 8, 11 (2013), 1876–1891.
DOI: Google ScholarDigital Library - [33] . 2008. Testing techniques for hardware security. In Proceedings of the 2008 IEEE International Test Conference. 1–10.
DOI: Google ScholarCross Ref - [34] . 2014. Efficient power and timing side channels for physical unclonable functions. In Cryptographic Hardware and Embedded Systems – CHES 2014. and (Eds.), Springer Berlin Heidelberg, Berlin, 476–492. Google Scholar
- [35] . 2017. ACRO-PUF: A low-power, reliable and aging-resilient current starved inverter-based ring oscillator physical unclonable function. IEEE Transactions on Circuits and Systems I: Regular Papers 64, 12 (2017), 3138–3149.
DOI: Google ScholarCross Ref - [36] . 2021. Enhancing the performance of lightweight configurable PUF for robust IoT hardware-assisted security. IEEE Access 9 (2021), 136792–136810.
DOI: Google ScholarCross Ref - [37] . 2016. Design, evaluation, and optimization of physical unclonable functions based on transient effect ring oscillators. IEEE Transactions on Information Forensics and Security 11, 6 (2016), 1291–1305.
DOI: Google ScholarDigital Library - [38] . 2018. Frequency offset-based ring oscillator physical unclonable function. IEEE Transactions on Multi-Scale Computing Systems 4, 4 (2018), 711–721.
DOI: Google ScholarCross Ref - [39] . 2014. Improving the reliability of RO PUF using frequency offset. In Proceedings of the 2014 International Conference on Field-Programmable Technology. 338–341.
DOI: Google ScholarCross Ref - [40] . 2016. A ring oscillator-based PUF with enhanced challenge-response pairs. Canadian Journal of Electrical and Computer Engineering 39, 2 (2016), 174–180.
DOI: Google ScholarCross Ref - [41] . 2012. A robust physical unclonable function with enhanced challenge-response set. IEEE Transactions on Information Forensics and Security 7, 1 (2012), 333–345.
DOI: Google ScholarDigital Library - [42] . 2010. Hardware intrinsic security from D flip-flops. In Proceedings of the 5th ACM Workshop on Scalable Trusted Computing. ACM, New York, NY, 53–62.
DOI: Google ScholarDigital Library - [43] . 2021. Double edge-triggered tristate flip-flop physical unclonable function for secure IoT ecosystem. In Proceedings of the 2021 IEEE International Symposium on Smart Electronic Systems. 44–47.
DOI: Google ScholarCross Ref - [44] . 2015. Scan-PUF: PUF elements selection methods for viable IC identification. In Proceedings of the 2015 IEEE 24th Asian Test Symposium. 121–126.
DOI: Google ScholarDigital Library - [45] . 2018. Register PUF with no power-up restrictions. In Proceedings of the 2018 IEEE International Symposium on Circuits and Systems. 1–5.
DOI: Google ScholarCross Ref - [46] . 2013. ScanPUF: Robust ultralow-overhead PUF using scan chain. In Proceedings of the 2013 18th Asia and South Pacific Design Automation Conference. 626–631.
DOI: Google ScholarCross Ref - [47] . 2017. How microprobing can attack encrypted memory. In Proceedings of the 2017 Euromicro Conference on Digital System Design. 244–251.
DOI: Google ScholarCross Ref - [48] . 2009. Validation of differential light emission analysis on FPGA. In Proceedings of the 2009 3rd International Conference on Signals, Circuits and Systems. 1–5.
DOI: Google ScholarCross Ref - [49] . 2011. Local and direct EM injection of power into CMOS integrated circuits. In Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography. 100–104.
DOI: Google ScholarDigital Library - [50] . 2016. Optical fault injection attacks for flash memory of smartcards. In Proceedings of the 2016 6th International Conference on Electronics Information and Emergency Communication. 46–50.
DOI: Google ScholarCross Ref - [51] . 2018. Timing Performance of Nanometer Digital Circuits Under Process Variations. Springer International Publishing.Google Scholar
- [52] . 2021. Modeling attack resistant strong PUF exploiting obfuscated interconnections with <0.83% bit-error rate. In Proceedings of the 2021 IEEE Asian Solid-State Circuits Conference. 1–3.
DOI: Google ScholarCross Ref - [53] . 2008. Controlled physical random functions and applications. ACM Transactions on Information and System Security 10, 4, Article
3 (Jan 2008), 22 pages.DOI: Google ScholarDigital Library - [54] . 2018. Cost-efficient design for modeling attacks resistant PUFs. In Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition. 467–472.
DOI: Google ScholarCross Ref - [55] Nuclei 2022. Nuclei RISC-V evaluation board MCU200T. Retrieved January 2023 from https://www.nucleisys.com.Google Scholar
- [56] . 2021. A multimode configurable physically unclonable function with bit-instability-screening and power-gating strategies. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, 1 (2021), 100–111.
DOI: Google ScholarCross Ref - [57] . 2010. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (rev. 1a ed.). National Institute of Standards and Technology, Gaithersburg, MD, 131.Google Scholar
- [58] . 2022. A machine learning attack-resilient strong PUF leveraging the process variation of MRAM. IEEE Transactions on Circuits and Systems II: Express Briefs 69, 6 (2022), 2712–2716.
DOI: Google ScholarCross Ref
Index Terms
- CBDC-PUF: A Novel Physical Unclonable Function Design Framework Utilizing Configurable Butterfly Delay Chain Against Modeling Attack
Recommendations
Modeling attacks on physical unclonable functions
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityWe show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves ...
A Modeling Attack Resilient Physical Unclonable Function Based on STT-MRAM
GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSIPhysical unclonable function (PUF) is considered as a promising hardware security primitive for a variety of applications. Recently, with the rapid development of integrated circuit (IC), the requirement for low complexity, high power efficiency and ...
Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks
Information Security and Cryptology -- ICISC 2013AbstractOne of the most common types of Physical Unclonable Functions (PUFs) is the ring oscillator PUF (RO-PUF), a type of PUF in which the output bits are obtained by comparing the oscillation frequencies of different ring oscillators. One application ...
Comments