Lightweight Modeling Attack-Resistant Multiplexer-Based Multi-PUF (MMPUF) Design on FPGA
Abstract
:1. Introduction
- We present a more accurate model for the previously proposed XMPUF design [18], and show that the XMPUF is vulnerable to LR attack.
- We propose a new MMPUF design to further enhance its security against modeling attacks.
- A detailed mathematical analysis of the proposed MMPUF design is given. Compared with the conventional APUF and XMPUF designs, the proposed MMPUF design has a higher computational complexity and more difficult to attack.
- Three most widely studied ML-based modeling attacks are used to investigate the resistance of the proposed MMPUF to modeling attacks. The experimental results demonstrate that the proposed MMPUF has good resistance to these ML attacks.
- We validate the proposed MMPUF architecture with the design implemented on 22 Xilinx 7 Series FPGAs. The proposed MMPUF design is the most lightweight MPUF design to the authors’ best knowledge.
- An experimental evaluation of this design shows the uniqueness result of 40.60%, which is much better compared with the previous Multi-PUF designs. Moreover, the proposed MMPUF design achieves good reliability results over temperature and voltage of 96% and 94%, respectively.
2. Related Work
2.1. Modeling Attack-Resistant PUF Designs
2.2. Weak PUF Based Multi-PUF Design
3. Mathematical Analysis of the Conventional Multi-PUF and XMPUF Designs
3.1. Mathematical Model of Conventional Multi-PUF Design
3.2. Mathematical Model of the Previous XMPUF Design
4. The Proposed MMPUF Design
4.1. Circuit Design
4.2. Mathematical Analysis
5. Machine Learning Attack Results
5.1. LR Attack Results
5.1.1. Results for the XMPUF Design Using Different Feature Vectors
5.1.2. The Prediction Rates of The XMPUF and MMPUF Designs
5.1.3. Results on Both the MMPUF and XMPUF Designs Affected by Noise
5.1.4. Results on the MMPUF Design with Different Numbers of MUXs
5.2. Attack Results Using SVM
5.3. Attack Results Using CMA-ES
5.4. Comparison
6. Hardware Implementation and Performance Evaluation
6.1. Hardware Implementation
6.2. Uniqueness Results
6.3. Reliability Results
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Pappu, R.; Recht, B.; Taylor, J.; Gershenfeld, N. Physical one-way functions. Science 2002, 297, 2026–2030. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Guajardo, J.; Kumar, S.S.; Schrijen, G.J.; Tuyls, P. FPGA intrinsic PUFs and their use for IP protection. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, 10–13 September 2007; pp. 63–80. [Google Scholar]
- Bhargava, M.; Mai, K. An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 24–28 March 2014; pp. 1–6. [Google Scholar]
- Tebelmann, L.; Pehl, M.; Sigl, G. EM side-channel analysis of BCH-based error correction for PUF-based key generation. In Proceedings of the Workshop on Attacks and Solutions in Hardware Security, Dallas, TX, USA, 3 November 2017; pp. 43–52. [Google Scholar]
- Gassend, B.; Clarke, D.; Van Dijk, M.; Devadas, S. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 148–160. [Google Scholar]
- Rührmair, U.; Sehnke, F.; Sölter, J.; Dror, G.; Devadas, S.; Schmidhuber, J. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM conference on Computer and Communications Security, Chicago, IL, USA, 4–8 October 2010; pp. 237–249. [Google Scholar]
- Suh, G.E.; Devadas, S. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 2007 44th ACM/IEEE Design Automation Conference, San Diego, CA, USA, 4–8 June 2007; pp. 9–14. [Google Scholar]
- Majzoobi, M.; Koushanfar, F.; Potkonjak, M. Lightweight secure PUFs. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, San Jose, CA, USA, 10–13 November 2008; pp. 670–673. [Google Scholar]
- Rührmair, U.; Sölter, J.; Sehnke, F.; Xu, X.; Mahmoud, A.; Stoyanova, V.; Dror, G.; Schmidhuber, J.; Burleson, W.; Devadas, S. PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1876–1891. [Google Scholar] [CrossRef] [Green Version]
- Becker, G.T. The gap between promise and reality: On the insecurity of XOR arbiter PUFs. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Santa Barbara, CA, USA, 19–22 August 2015; pp. 535–555. [Google Scholar]
- Vijayakumar, A.; Kundu, S. A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France, 9–13 March 2015; pp. 653–658. [Google Scholar]
- Gao, Y.; Li, G.; Ma, H.; Al-Sarawi, S.F.; Kavehei, O.; Abbott, D.; Ranasinghe, D.C. Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices. In Proceedings of the IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Kollam, India, 21–22 October 2016; pp. 1–6. [Google Scholar]
- Ye, J.; Hu, Y.; Li, X. RPUF: Physical unclonable function with randomized challenge to resist modeling attack. In Proceedings of the IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), Austin, TX, USA, 19–20 December 2016; pp. 1–6. [Google Scholar]
- Nguyen, P.H.; Sahoo, D.P.; Jin, C.; Mahmood, K.; Rührmair, U.; van Dijk, M. The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 243–290. [Google Scholar] [CrossRef]
- Yu, M.D.; M’Raïhi, D.; Verbauwhede, I.; Devadas, S. A noise bifurcation architecture for linear additive physical functions. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Washington, DC, USA, 31 October 2014; pp. 124–129. [Google Scholar]
- Shi, J.; Lu, Y.; Zhang, J. Approximation Attacks on Strong PUFs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2019. [Google Scholar] [CrossRef]
- Gu, C.; Chang, C.H.; Liu, W.; Yu, S.; Ma, Q.; O’neill, M. A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication. In Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Xi’an, China, 16–17 December 2019; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Ma, Q.; Gu, C.; Hanley, N.; Wang, C.; Liu, W.; O’Neill, M. A machine learning attack resistant multi-PUF design on FPGA. In Proceedings of the 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), Jeju, Korea, 22–25 January 2018; pp. 97–104. [Google Scholar]
- Kumar, R.; Burleson, W. On design of a highly secure PUF based on non-linear current mirrors. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Washington, DC, USA, 31 October 2014; pp. 38–43. [Google Scholar]
- Arafin, M.T.; Gao, M.; Qu, G. VOLtA: Voltage over-scaling based lightweight authentication for IoT applications. In Proceedings of the 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), Chiba, Japan, 16–19 January 2017; pp. 336–341. [Google Scholar]
- Zalivaka, S.S.; Ivaniuk, A.A.; Chang, C.H. FPGA implementation of modeling attack resistant arbiter PUF with enhanced reliability. In Proceedings of the 18th International Symposium on Quality Electronic Design (ISQED), Dubrovnik, Croatia, 28–30 June 2017; pp. 313–318. [Google Scholar]
- Su, H.; Zhang, J. Machine learning attacks on voltage over-scaling-based lightweight authentication. In Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Hong Kong, China, 17–18 December 2018; pp. 50–55. [Google Scholar]
- Sahoo, D.P.; Mukhopadhyay, D.; Chakraborty, R.S.; Nguyen, P.H. A multiplexer-based arbiter PUF composition with enhanced reliability and security. IEEE Trans. Comput. 2017, 67, 403–417. [Google Scholar] [CrossRef]
- Konigsmark, S.C.; Hwang, L.K.; Chen, D.; Wong, M.D. System-of-PUFs: Multilevel security for embedded systems. In Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, New Delhi, India, 12–14 October 2014; pp. 1–10. [Google Scholar]
- Sahoo, D.P.; Saha, S.; Mukhopadhyay, D.; Chakraborty, R.S.; Kapoor, H. Composite PUF: A new design paradigm for physically unclonable functions on FPGA. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Washington, DC, USA, 31 October 2014; pp. 50–55. [Google Scholar]
- Zalivaka, S.S.; Ivaniuk, A.A.; Chang, C.H. Low-cost fortification of arbiter PUF against modeling attack. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA, 28–31 May 2017; pp. 1–4. [Google Scholar]
- Tehranipoor, F.; Karimian, N.; Yan, W.; Chandy, J.A. DRAM-based intrinsic physically unclonable functions for system-level security and authentication. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2016, 25, 1085–1097. [Google Scholar] [CrossRef]
- Gu, C.; Hanley, N.; O’neill, M. Improved reliability of FPGA-based PUF identification generator design. ACM Trans. Reconfigurable Technol. Syst. (TRETS) 2017, 10, 1–23. [Google Scholar] [CrossRef] [Green Version]
- Gu, C.; Cui, Y.; Hanley, N.; O’Neill, M. Novel lightweight FF-APUF design for FPGA. In Proceedings of the 29th IEEE International System-on-Chip Conference (SOCC), Seattle, WA, USA, 6–9 September 2016; pp. 75–80. [Google Scholar]
- Lim, D.; Lee, J.W.; Gassend, B.; Suh, G.E.; Van Dijk, M.; Devadas, S. Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2005, 13, 1200–1205. [Google Scholar]
- Tum. Physical Cryptography Project. Technical Report. Available online: http://www.pcp.in.tum.de/code/lr.zip (accessed on 7 June 2018).
- Hospodar, G.; Maes, R.; Verbauwhede, I. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability. In Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2–5 December 2012; pp. 37–42. [Google Scholar]
- Alamro, M.A.; Zhuang, Y.; Aseeri, A.O.; Alkatheiri, M.S. Examination of Double Arbiter PUFs on Security against Machine Learning Attacks. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 3165–3171. [Google Scholar]
- Hansen, N. The CMA evolution strategy: A comparing review. In Towards a New Evolutionary Computation; Springer: Berlin/Heidelberg, Germany, 2006; pp. 75–102. [Google Scholar]
- Konigsmark, S.T.C.; Chen, D.; Wong, M.D. PolyPUF: Physically secure self-divergence. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2015, 35, 1053–1066. [Google Scholar] [CrossRef]
- Ye, J.; Hu, Y.; Li, X. POSTER: Attack on non-linear physical unclonable function. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24 October 2016; pp. 1751–1753. [Google Scholar]
- Gu, C.; Murphy, J.; O’Neill, M. A unique and robust single slice FPGA identification generator. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, Australia, 1–5 June 2014; pp. 1223–1226. [Google Scholar]
- Majzoobi, M.; Rostami, M.; Koushanfar, F.; Wallach, D.S.; Devadas, S. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. In Proceedings of the IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, 24–25 May 2012; pp. 33–44. [Google Scholar]
Type | No. CRPs () | Gaussian Distribution of (0, ) | |||
---|---|---|---|---|---|
= 0 | = 0.1 | = 0.25 | = 0.5 | ||
APUF | 1 | 90.6% | 88% | 86.2% | 81% |
5 | 98.77% | 97% | 94.63% | 88.9% | |
20 | 99.49% | 97.63% | 94.61% | 89.64% | |
40 | 99.67% | 97.8% | 94.84% | 89.87% | |
80 | 99.79% | 97.95% | 94.7% | 89.69% | |
100 | 99.82% | 97.88% | 94.77% | 89.85% | |
XOR APUF | 1 | 88% | 87.4% | 86.4% | 84.8% |
5 | 87.2% | 86.6% | 83.8% | 84.6% | |
20 | 50.8% | 50.35% | 50.2% | 50.4% | |
40 | 87.2% | 86.6% | 83.8% | 84.6% | |
80 | 50.8% | 50.35% | 50.2% | 50.4% | |
100 | 50.8% | 50.35% | 50.2% | 50.4% | |
XMPUF | 1 | 90.4% | 86.9% | 86.2% | 83.8% |
5 | 98.25% | 95.55% | 94.08% | 88.03% | |
20 | 99.51% | 97.46% | 94.61% | 88.58% | |
40 | 99.63% | 97.71% | 94.84% | 88.8% | |
80 | 99.77% | 97.89% | 94.9% | 88.59% | |
100 | 99.82% | 97.96% | 94.96% | 88.6% | |
MMPUF | 1 | 52.24% | 51.57% | 53.9% | 50.36% |
5 | 51.07% | 54.21% | 51.64% | 53.44% | |
20 | 51.88% | 53.12% | 50.31% | 52.61% | |
40 | 50.63% | 53.65% | 53.77% | 50.31% | |
80 | 51.48% | 52.34% | 50.26% | 52.98% | |
100 | 53.57% | 55.23% | 53.02% | 51.47% |
Type | Prediction Rate (Average) | Prediction Rate (Maximum) | No. CRPs () | Training Time |
---|---|---|---|---|
APUF (64 bit) | 99.21% | 99.41% | 6 | 7.55 s |
XOR APUF (64 bit) | 98.13% | 98.25% | 80 | 3:13 h |
XMPUF (64 bit) | 99.18% | 99.22% | 6 | 7.8 s |
MMPUF (64 bit) | 51.74% | 53.67% | 6 | 10.36 s |
APUF (128 bit) | 99.1% | 99.17% | 10 | 20.05 s |
XOR APUF (128 bit) | 96.56% | 96.89% | 100 | 3:30 h |
XMPUF (128 bit) | 99.07% | 99.23% | 10 | 21.65 s |
MMPUF (128 bit) | 50.32% | 52.44% | 10 | 23.54 s |
Type | Bit Length | No. CRPs () | Prediction Rate | Attack Model |
---|---|---|---|---|
PolyPUF [35] | 32 | 5 50 500 | 50.1% 50.03% 50% | ANN |
64 | 5 50 500 | 50.02% 50% 50.01% | ||
OB-PUF [12] | 64 | 10 20 100 | 52.28% 63.27% 71.92% | LR |
RPUF [13] | 32 64 128 | 0.1 0.2 0.2 | 75% 59.1% 64.2% | Compound Heuristic Algorithm [36] |
MMPUF | 32 | 5 50 100 | 52.85% 53.41% 53.66% | LR |
64 | 5 50 100 | 53.77% 55.39% 56.55% | ||
MMPUF | 32 | 1 | 74.1% | CMA-ES |
64 | 1 5 10 | 60.51% 71.96% 74.18% | ||
128 | 1 5 10 | 58.61% 70.33% 71.55% |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cui, Y.; Gu, C.; Ma, Q.; Fang, Y.; Wang, C.; O’Neill, M.; Liu, W. Lightweight Modeling Attack-Resistant Multiplexer-Based Multi-PUF (MMPUF) Design on FPGA. Electronics 2020, 9, 815. https://doi.org/10.3390/electronics9050815
Cui Y, Gu C, Ma Q, Fang Y, Wang C, O’Neill M, Liu W. Lightweight Modeling Attack-Resistant Multiplexer-Based Multi-PUF (MMPUF) Design on FPGA. Electronics. 2020; 9(5):815. https://doi.org/10.3390/electronics9050815
Chicago/Turabian StyleCui, Yijun, Chongyan Gu, Qingqing Ma, Yue Fang, Chenghua Wang, Máire O’Neill, and Weiqiang Liu. 2020. "Lightweight Modeling Attack-Resistant Multiplexer-Based Multi-PUF (MMPUF) Design on FPGA" Electronics 9, no. 5: 815. https://doi.org/10.3390/electronics9050815
APA StyleCui, Y., Gu, C., Ma, Q., Fang, Y., Wang, C., O’Neill, M., & Liu, W. (2020). Lightweight Modeling Attack-Resistant Multiplexer-Based Multi-PUF (MMPUF) Design on FPGA. Electronics, 9(5), 815. https://doi.org/10.3390/electronics9050815