A Photonic Physically Unclonable Function's Resilience to
  Multiple-Valued Machine Learning Attacks
        - URL: http://arxiv.org/abs/2403.01299v1
 - Date: Sat, 2 Mar 2024 19:44:19 GMT
 - Title: A Photonic Physically Unclonable Function's Resilience to
  Multiple-Valued Machine Learning Attacks
 - Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva
  Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, and
  Mitchell A. Thornton
 - Abstract summary: Physically unclonable functions (PUFs) identify integrated circuits using nonlinearly-related challenge-response pairs (CRPs)
We find that approximately 1,000 CRPs are necessary to train models that predict response bits better than random chance.
Given the significant challenge of acquiring a vast number of CRPs from a photonic PUF, our results demonstrate photonic PUF resilience against such attacks.
 - Score: 2.271444649286985
 - License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
 - Abstract:   Physically unclonable functions (PUFs) identify integrated circuits using
nonlinearly-related challenge-response pairs (CRPs). Ideally, the relationship
between challenges and corresponding responses is unpredictable, even if a
subset of CRPs is known. Previous work developed a photonic PUF offering
improved security compared to non-optical counterparts. Here, we investigate
this PUF's susceptibility to Multiple-Valued-Logic-based machine learning
attacks. We find that approximately 1,000 CRPs are necessary to train models
that predict response bits better than random chance. Given the significant
challenge of acquiring a vast number of CRPs from a photonic PUF, our results
demonstrate photonic PUF resilience against such attacks.
 
       
      
        Related papers
        - 3D Gaussian Splatting Driven Multi-View Robust Physical Adversarial   Camouflage Generation [50.03578546845548]
Physical adversarial attack methods expose the vulnerabilities of deep neural networks and pose a significant threat to safety-critical scenarios such as autonomous driving.<n> Camouflage-based physical attack is a more promising approach compared to the patch-based attack, offering stronger adversarial effectiveness in complex physical environments.<n>We propose a physical attack framework based on 3D Gaussian Splatting (3DGS), named PGA, which provides rapid and precise reconstruction with few images.
arXiv  Detail & Related papers  (2025-07-02T05:10:16Z) - Fast and Robust Speckle Pattern Authentication by Scale Invariant   Feature Transform algorithm in Physical Unclonable Functions [1.0319299382223166]
We present a metric-independent authentication approach that leverages the Scale Invariant Feature Transform (SIFT) algorithm.
The authentication process is highly reliable even in presence of response rotation, zooming, and cropping.
This work broadens the applicability and reliability of PUF to practical high-security authentication or merchandise anti-counterfeiting.
arXiv  Detail & Related papers  (2025-04-28T11:36:04Z) - Designing a Photonic Physically Unclonable Function Having Resilience to   Machine Learning Attacks [2.369276238599885]
We describe a computational PUF model for producing datasets required for training machine learning (ML) attacks.
We find that the modeled PUF generates distributions that resemble uniform white noise.
Preliminary analysis suggests that the PUF exhibits similar resilience to generative adversarial networks.
arXiv  Detail & Related papers  (2024-04-03T03:58:21Z) - Machine Learning Resistant Amorphous Silicon Physically Unclonable
  Functions (PUFs) [0.9423257767158634]
We investigate usage of nonlinear wave chaotic amorphous silicon (a-Si) cavities as physically unclonable functions (PUF)
Machine learning attacks on integrated electronic PUFs have been demonstrated to be very effective at modeling PUF behavior.
arXiv  Detail & Related papers  (2024-02-05T10:00:28Z) - SAM Meets UAP: Attacking Segment Anything Model With Universal   Adversarial Perturbation [61.732503554088524]
We investigate whether it is possible to attack Segment Anything Model (SAM) with image-aversagnostic Universal Adrial Perturbation (UAP)
We propose a novel perturbation-centric framework that results in a UAP generation method based on self-supervised contrastive learning (CL)
The effectiveness of our proposed CL-based UAP generation method is validated by both quantitative and qualitative results.
arXiv  Detail & Related papers  (2023-10-19T02:49:24Z) - Active learning for fast and slow modeling attacks on Arbiter PUFs [7.8713273072725665]
In most modeling attacks, a random subset of challenge-response-pairs (CRPs) are used as the labeled data for the machine learning algorithm.
We focus on challenge selection to help SVM algorithm learn fast'' and learn slow''
arXiv  Detail & Related papers  (2023-08-25T19:34:01Z) - Polynomial Bounds for Learning Noisy Optical Physical Unclonable
  Functions and Connections to Learning With Errors [0.0]
It is shown that a class of optical physical unclonable functions (PUFs) can be learned to precision with arbitrarily high probability, even in the presence of noise.
This extends the results of Rh"uramir et al. (2013), who showed a subset of this class of PUFs to be learnable in time in the absence of noise.
arXiv  Detail & Related papers  (2023-08-17T22:26:48Z) - Physics-Driven Turbulence Image Restoration with Stochastic Refinement [80.79900297089176]
Image distortion by atmospheric turbulence is a critical problem in long-range optical imaging systems.
Fast and physics-grounded simulation tools have been introduced to help the deep-learning models adapt to real-world turbulence conditions.
This paper proposes the Physics-integrated Restoration Network (PiRN) to help the network to disentangle theity from the degradation and the underlying image.
arXiv  Detail & Related papers  (2023-07-20T05:49:21Z) - RBSR: Efficient and Flexible Recurrent Network for Burst
  Super-Resolution [57.98314517861539]
Burst super-resolution (BurstSR) aims at reconstructing a high-resolution (HR) image from a sequence of low-resolution (LR) and noisy images.
In this paper, we suggest fusing cues frame-by-frame with an efficient and flexible recurrent network.
arXiv  Detail & Related papers  (2023-06-30T12:14:13Z) - ReDFeat: Recoupling Detection and Description for Multimodal Feature
  Learning [51.07496081296863]
We recouple independent constraints of detection and description of multimodal feature learning with a mutual weighting strategy.
We propose a detector that possesses a large receptive field and is equipped with learnable non-maximum suppression layers.
We build a benchmark that contains cross visible, infrared, near-infrared and synthetic aperture radar image pairs for evaluating the performance of features in feature matching and image registration tasks.
arXiv  Detail & Related papers  (2022-05-16T04:24:22Z) - Modeling Strong Physically Unclonable Functions with Metaheuristics [7.673465837624365]
Evolutionary algorithms have been successfully applied to attacking Physically Unclonable Functions.
 CMA-ES is recognized as the most powerful option for a type of attack called the reliability attack.
We take a step back and evaluate several metaheuristics for the challenge-response pair-based attack on strong PUFs.
arXiv  Detail & Related papers  (2022-02-16T14:00:16Z) - Efficient Model-Based Multi-Agent Mean-Field Reinforcement Learning [89.31889875864599]
We propose an efficient model-based reinforcement learning algorithm for learning in multi-agent systems.
Our main theoretical contributions are the first general regret bounds for model-based reinforcement learning for MFC.
We provide a practical parametrization of the core optimization problem.
arXiv  Detail & Related papers  (2021-07-08T18:01:02Z) - Adversarial Attack on Deep Product Quantization Network for Image
  Retrieval [74.85736968193879]
Deep product quantization network (DPQN) has recently received much attention in fast image retrieval tasks.
Recent studies show that deep neural networks (DNNs) are vulnerable to input with small and maliciously designed perturbations.
We propose product quantization adversarial generation (PQ-AG) to generate adversarial examples for product quantization based retrieval systems.
arXiv  Detail & Related papers  (2020-02-26T09:25:58Z) 
        This list is automatically generated from the titles and abstracts of the papers in this site.
       
     
           This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.