Lightweight Strategy for XOR PUFs as Security Primitives for
Resource-constrained IoT device
- URL: http://arxiv.org/abs/2210.01749v1
- Date: Tue, 4 Oct 2022 17:12:36 GMT
- Title: Lightweight Strategy for XOR PUFs as Security Primitives for
Resource-constrained IoT device
- Authors: Gaoxiang Li, Khalid T. Mursi, Yu Zhuang
- Abstract summary: XOR Arbiter PUF (XOR-PUF) is one of the most studied PUFs.
Recent attack studies reveal that even XOR-PUFs with large XOR sizes are still not safe against machine learning attacks.
We present a strategy that combines the choice of XOR Arbiter PUF (XOR-PUF) architecture parameters with the way XOR-PUFs are used.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Physical Unclonable Functions (PUFs) are promising security primitives for
resource-constrained IoT devices. And the XOR Arbiter PUF (XOR-PUF) is one of
the most studied PUFs, out of an effort to improve the resistance against
machine learning attacks of probably the most lightweight delay-based PUFs -
the Arbiter PUFs. However, recent attack studies reveal that even XOR-PUFs with
large XOR sizes are still not safe against machine learning attacks. Increasing
PUF stages or components and using different challenges for different
components are two ways to improve the security of APUF-based PUFs, but more
stages or components lead to more hardware cost and higher operation power, and
different challenges for different components require the transmission of more
bits during operations, which also leads to higher power consumption. In this
paper, we present a strategy that combines the choice of XOR Arbiter PUF
(XOR-PUF) architecture parameters with the way XOR-PUFs are used to achieve
lightweights in hardware cost and energy consumption as well as security
against machine learning attacks. Experimental evaluations show that with the
proposed strategy, highly lightweight component-differentially challenged
XOR-PUFs can withstand the most powerful machine learning attacks developed so
far and maintain excellent intra-device and inter-device performance, rendering
this strategy a potential blueprint for the fabrication and use of XOR-PUFs for
resource-constrained IoT applications.
Related papers
- Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and
Security in IoT Devices [2.28438857884398]
Physically Unclonable Functions (PUFs) generate unique cryptographic keys from inherent hardware variations.
Traditional PUFs like Arbiter PUFs (APUFs) and XOR Arbiter PUFs (XOR-PUFs) are susceptible to machine learning (ML) and reliability-based attacks.
We propose an optimized CDC-XPUF design that incorporates a pre-selection strategy to enhance reliability and introduces a novel lightweight architecture.
arXiv Detail & Related papers (2024-09-26T14:50:20Z) - Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks [2.369276238599885]
We describe a computational PUF model for producing datasets required for training machine learning (ML) attacks.
We find that the modeled PUF generates distributions that resemble uniform white noise.
Preliminary analysis suggests that the PUF exhibits similar resilience to generative adversarial networks.
arXiv Detail & Related papers (2024-04-03T03:58:21Z) - Attacking Delay-based PUFs with Minimal Adversary Model [13.714598539443513]
Physically Unclonable Functions (PUFs) provide a streamlined solution for lightweight device authentication.
Delay-based Arbiter PUFs, with their ease of implementation and vast challenge space, have received significant attention.
Research is polarized between developing modelling-resistant PUFs and devising machine learning attacks against them.
arXiv Detail & Related papers (2024-03-01T11:35:39Z) - Transforming Image Super-Resolution: A ConvFormer-based Efficient Approach [58.57026686186709]
We introduce the Convolutional Transformer layer (ConvFormer) and propose a ConvFormer-based Super-Resolution network (CFSR)
CFSR inherits the advantages of both convolution-based and transformer-based approaches.
Experiments demonstrate that CFSR strikes an optimal balance between computational cost and performance.
arXiv Detail & Related papers (2024-01-11T03:08:00Z) - Active learning for fast and slow modeling attacks on Arbiter PUFs [7.8713273072725665]
In most modeling attacks, a random subset of challenge-response-pairs (CRPs) are used as the labeled data for the machine learning algorithm.
We focus on challenge selection to help SVM algorithm learn fast'' and learn slow''
arXiv Detail & Related papers (2023-08-25T19:34:01Z) - Computation Offloading and Resource Allocation in F-RANs: A Federated
Deep Reinforcement Learning Approach [67.06539298956854]
fog radio access network (F-RAN) is a promising technology in which the user mobile devices (MDs) can offload computation tasks to the nearby fog access points (F-APs)
arXiv Detail & Related papers (2022-06-13T02:19:20Z) - A New Security Boundary of Component Differentially Challenged XOR PUFs
Against Machine Learning Modeling Attacks [0.0]
The XOR Arbiter PUF (XOR PUF or XPUF) is an intensively studied PUF invented to improve the security of the Arbiter PUF.
Recently, highly powerful machine learning attack methods were discovered and were able to easily break large-sized XPUFs.
In this paper, the two current most powerful two machine learning methods for attacking XPUFs are adapted by fine-tuning the parameters of the two methods for CDC-XPUFs.
arXiv Detail & Related papers (2022-06-02T21:51:39Z) - Efficient Few-Shot Object Detection via Knowledge Inheritance [62.36414544915032]
Few-shot object detection (FSOD) aims at learning a generic detector that can adapt to unseen tasks with scarce training samples.
We present an efficient pretrain-transfer framework (PTF) baseline with no computational increment.
We also propose an adaptive length re-scaling (ALR) strategy to alleviate the vector length inconsistency between the predicted novel weights and the pretrained base weights.
arXiv Detail & Related papers (2022-03-23T06:24:31Z) - LAS-AT: Adversarial Training with Learnable Attack Strategy [82.88724890186094]
"Learnable attack strategy", dubbed LAS-AT, learns to automatically produce attack strategies to improve the model robustness.
Our framework is composed of a target network that uses AEs for training to improve robustness and a strategy network that produces attack strategies to control the AE generation.
arXiv Detail & Related papers (2022-03-13T10:21:26Z) - Improving Robustness of Reinforcement Learning for Power System Control
with Adversarial Training [71.7750435554693]
We show that several state-of-the-art RL agents proposed for power system control are vulnerable to adversarial attacks.
Specifically, we use an adversary Markov Decision Process to learn an attack policy, and demonstrate the potency of our attack.
We propose to use adversarial training to increase the robustness of RL agent against attacks and avoid infeasible operational decisions.
arXiv Detail & Related papers (2021-10-18T00:50:34Z) - UPDeT: Universal Multi-agent Reinforcement Learning via Policy
Decoupling with Transformers [108.92194081987967]
We make the first attempt to explore a universal multi-agent reinforcement learning pipeline, designing one single architecture to fit tasks.
Unlike previous RNN-based models, we utilize a transformer-based model to generate a flexible policy.
The proposed model, named as Universal Policy Decoupling Transformer (UPDeT), further relaxes the action restriction and makes the multi-agent task's decision process more explainable.
arXiv Detail & Related papers (2021-01-20T07:24:24Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.