State-of-the-art Machine Learning based Modeling Attacks Phuong Ha - - PowerPoint PPT Presentation

state of the art machine learning based modeling attacks
SMART_READER_LITE
LIVE PREVIEW

State-of-the-art Machine Learning based Modeling Attacks Phuong Ha - - PowerPoint PPT Presentation

The Interpose PUF (iPUF): Secure PUF Design against State-of-the-art Machine Learning based Modeling Attacks Phuong Ha Nguyen, Durga P. Sahoo, Kaleel Mahmood, Chenglu Jin, Ulrich Rhrmair and Marten van Dijk Secure Computation Laboratory


slide-1
SLIDE 1

Secure Computation Laboratory Department of Electrical & Computer Engineering University of Connecticut

The Interpose PUF (iPUF): Secure PUF Design against State-of-the-art Machine Learning based Modeling Attacks

Phuong Ha Nguyen, Durga P. Sahoo, Kaleel Mahmood, Chenglu Jin, Ulrich Rührmair and Marten van Dijk Chenglu Durga

CHES 2019

Kaleel Uli Marten Ha

slide-2
SLIDE 2

Content

2

  • 1. Concept - Overview - Motivation
  • 2. Strong PUFs: APUF, XOR APUF and Interpose PUF (iPUF)
  • 3. Short-term Reliability
  • 4. Reliability based modeling attacks on XOR PUF: understanding
  • 5. Interpose PUF – a lightweight PUF which is secure against state-of-the art

modeling attacks

  • 6. Conclusion
slide-3
SLIDE 3
  • 1. Concept - Overview - Motivation

3

slide-4
SLIDE 4

Concept - Overview – Motivation [1]

4

Hardware Primitive [Device] Challenge C Response R Weak PUF - small #CRPs: RO PUF, SRAM PUF, etc. Strong PUF – large #CRPs: Application: device Identification, authentication and crypto key generation No Security Proof: Power Grid PUF, Clock PUF, Crossbard PUF Security Proof: LPN PUFs - heavy Broken but lightweight: APUF, XOR APUF, Feed Forward PUF, Lightweight Secure PUF, Bistable Ring PUF, MPUF etc. Nature: process variation – physically unclonability - unique PUF’s Category:

slide-5
SLIDE 5

Concept - Overview – Motivation [2]

5

Hardware Primitive [Device] Challenge C Response R Weak PUF - small #CRPs: RO PUF, SRAM PUF, etc. Strong PUF – large #CRPs: Application: device Identification, authentication and crypto key generation No Security Proof: Power Grid PUF, Clock PUF, Crossbard PUF Security Proof: LPN PUFs - heavy Broken but lightweight: APUF, XOR APUF, Feed Forward PUF, Lightweight Secure PUF, Bistable Ring PUF, MPUF etc. Nature: process variation – physically unclonability - unique PUF’s Category:

slide-6
SLIDE 6

Concept - Overview – Motivation [3]

6

Hardware Primitive [Device] Challenge C Response R Weak PUF - small #CRPs: RO PUF, SRAM PUF, etc. Strong PUF – large #CRPs: PUF’s Modeling Attacks on CRPs only: No Security Proof: Power Grid PUF, Clock PUF, Crossbard PUF Security Proof: LPN PUFs

  • heavy

Broken but lightweight: APUF, XOR APUF, Feed Forward PUF, Lightweight Secure PUF, Bistable Ring PUF, MPUF etc. PUF’s Category: Classical ML attacks – reliable CRPs: Support Vector Machine (SVM), Logistic Regression (LR), Evolution Strategy (ES), Covariance Matrix Adaptation ES (CMA-ES), Perceptron, Boolean Attacks, Deep Neural Network Attacks (DNN) Advanced ML attacks – noisy CRPs: CMA-ES + noisy CRPs

slide-7
SLIDE 7

Concept - Overview – Motivation [4]

7

Hardware Primitive [Device] Challenge C Response R Weak PUF - small #CRPs: RO PUF, SRAM PUF, etc. Strong PUF – large #CRPs: PUF’s Modeling Attacks with CRPs only: No Security Proof: Power Grid PUF, Clock PUF, Crossbard PUF Security Proof: LPN PUFs

  • heavy

Broken but lightweight: APUF, XOR APUF, Feed Forward PUF, Lightweight Secure PUF, Bistable Ring PUF, MPUF etc. PUF’s Category: Classical ML attacks – reliable CRPs: Support Vector Machine (SVM), Logistic Regression (LR), Evolution Strategy (ES), Covariance Matrix Adaptation ES (CMA-ES), Perceptron, Boolean Attacks, Deep Neural Network Attacks (DNN) Advanced ML attacks – noisy CRPs: CMA-ES + noisy CRPs

slide-8
SLIDE 8

Concept - Overview – Motivation [5]

8

Hardware Primitive [Device] Challenge C Response R Weak PUF - small #CRPs: RO PUF, SRAM PUF, etc. Strong PUF – large #CRPs: PUF’s Modeling Attacks with CRPs only: No Security Proof: Power Grid PUF, Clock PUF, Crossbar PUF Security Proof: LPN PUFs

  • Large HW

footprint Broken but lightweight: Arbiter PUF/APUF, XOR APUF, Feed Forward PUF, Lightweight Secure PUF, Bistable Ring PUF. PUF’s Category: Classical ML attacks – reliable CRPs: Support Vector Machine (SVM), Logistic Regression (LR), Evolution Strategy (ES), Covariance Matrix Adaptation ES (CMA-ES), Perceptron, Boolean Attacks, Deep Neural Network Attacks (DNN) Advanced ML attacks – noisy CRPs: CMA-ES + noisy CRPs

slide-9
SLIDE 9

Concept - Overview – Motivation [6]

9

Hardware Primitive [Device] Challenge C Response R Weak PUF - small #CRPs: RO PUF, SRAM PUF, etc. Strong PUF – large #CRPs: PUF’s Modeling Attacks with CRPs only: Broken but lightweight: Arbiter PUF/APUF, XOR APUF, Feed Forward PUF, Lightweight Secure PUF, Bistable Ring PUF. PUF’s Category: Classical ML attacks – reliable CRPs: Advanced ML attacks – noisy CRPs: CMA-ES + noisy CRPs XOR APUF Security Proof Vulnerability Lightweight, Precise Math. Model

slide-10
SLIDE 10

Concept - Overview – Motivation [7]

10

Hardware Primitive [Device] Challenge C Response R Weak PUF - small #CRPs: RO PUF, SRAM PUF, etc. Strong PUF – large #CRPs: PUF’s Modeling Attacks with CRPs only: Broken but lightweight: Arbiter PUF/APUF, XOR APUF, Feed Forward PUF, Lightweight Secure PUF, Bistable Ring PUF. PUF’s Category: Classical ML attacks – reliable CRPs: Advanced ML attacks – noisy CRPs: CMA-ES + noisy CRPs XOR APUF interpose PUF (iPUF) Security Proof Lightweight, Precise Math. Model Security Proof

slide-11
SLIDE 11

Concept - Overview – Motivation [8]

11

Hardware Primitive [Device] Challenge C Response R Weak PUF - small #CRPs: RO PUF, SRAM PUF, etc. Strong PUF – large #CRPs: PUF’s Modeling Attacks with CRPs only: Broken but lightweight: Arbiter PUF/APUF, XOR APUF, Feed Forward PUF, Lightweight Secure PUF, Bistable Ring PUF. PUF’s Category: Classical ML attacks – reliable CRPs: Advanced ML attacks – noisy CRPs: CMA-ES + noisy CRPs XOR APUF interpose PUF (iPUF) Security Proof Lightweight, Precise Math. Model Security Proof Security Philosophy Design Philosophy

slide-12
SLIDE 12
  • 2. APUF- XOR APUF -iPUF

12

slide-13
SLIDE 13

APUF, XOR APUF and iPUF [1]

Arbiter PUF (APUF) [1] Interpose PUF (iPUF) x-XOR APUF

  • Extremely lightweight and large number of CRPs i.e, 2𝑜 CRPs
  • Environmental noises make the PUF’s outputs unreliable sometimes
  • Not secure against modeling attacks
slide-14
SLIDE 14

APUF, XOR APUF and iPUF [2]

Arbiter PUF (APUF) x-XOR APUF

slide-15
SLIDE 15

APUF, XOR APUF and iPUF [3]

15

The Interpose PUF / iPUF

slide-16
SLIDE 16

APUF, XOR APUF and iPUF [4]

16

Arbiter PUF (APUF) x-XOR Arbiter PUF Interpose PUF (iPUF)

  • Δ > 0 → 𝑠 = 1. 𝑃𝑢ℎ𝑓𝑠𝑥𝑗𝑡𝑓 𝑠 = 0
  • Δ = 𝒆𝒗𝒒𝒒𝒇𝒔 − 𝒆𝒎𝒑𝒙𝒇𝒔 = 𝒙 ⋅ 𝚾
  • 𝒙 ∶ 𝑣𝑜𝑗𝑟𝑣𝑓 𝑥𝑓𝑗𝑕ℎ𝑢 𝑤𝑓𝑑𝑢𝑝𝑠,

𝑒𝑓𝑚𝑏𝑧 𝑠𝑓𝑞𝑠𝑓𝑡𝑓𝑜𝑢𝑏𝑢𝑗𝑝𝑜 𝑔𝑝𝑠 𝑏𝑜𝑧 𝐵𝑄𝑉𝐺 𝑗𝑜𝑡𝑢𝑏𝑜𝑑𝑓

  • 𝚾 𝑗𝑡 𝑢ℎ𝑓 𝑞𝑏𝑠𝑗𝑢𝑧 𝑤𝑓𝑑𝑢𝑝𝑠

𝚾 𝑗 = 𝑘=𝑗,…,𝑜−1 1 − 𝒅 𝑘 , 𝑗 = 0, … , 𝑜 − 1 , 𝚾 𝑜 = 1 Precise linear model + CRPs + ML = practically and softwarelly clonable Precise non-linear model + CRPs + classical ML = impractically softwarelly clonable 𝑦, 𝑧 − 𝐽𝑄𝑉𝐺 ≈ 𝑧 + 𝑦 2 − 𝑌𝑃𝑆 𝑄𝑉𝐺 if a is inserted at the middle Precise non-linear model + CRPs + classical ML = impractically softwarelly clonable

XOR APUF is not Secure against noisy CRPs + CMA-ES [Advanced ML]! (CHES2015) why? Why not for IPUF?

slide-17
SLIDE 17

APUF, XOR APUF and iPUF [5]

17

Arbiter PUF (APUF) x-XOR Arbiter PUF Interpose PUF (iPUF)

Precise non-linear model + CRPs + classical ML = impractically softwarelly clonable 𝑦, 𝑧 − 𝐽𝑄𝑉𝐺 ≈ 𝑧 + 𝑦 2 − 𝑌𝑃𝑆 𝑄𝑉𝐺 if a is inserted at the middle Precise non-linear model + CRPs + classical ML = impractically softwarelly clonable

XOR APUF is not Secure against noisy CRPs + CMA-ES [Advanced ML]! (CHES2015) why? Why not for IPUF?

  • Δ > 0 → 𝑠 = 1. 𝑃𝑢ℎ𝑓𝑠𝑥𝑗𝑡𝑓 𝑠 = 0
  • Δ = 𝒆𝒗𝒒𝒒𝒇𝒔 − 𝒆𝒎𝒑𝒙𝒇𝒔 = 𝒙 ⋅ 𝚾
  • 𝒙 ∶ 𝑣𝑜𝑗𝑟𝑣𝑓 𝑔𝑝𝑠 𝑏𝑜𝑧 𝐵𝑄𝑉𝐺 𝑗𝑜𝑡𝑢𝑏𝑜𝑑𝑓
  • 𝚾 𝑗𝑡 𝑢ℎ𝑓 𝑞𝑏𝑠𝑗𝑢𝑧 𝑤𝑓𝑑𝑢𝑝𝑠

𝚾 𝑗 = 𝑘=𝑗,…,𝑜−1 1 − 𝒅 𝑘 , 𝑗 = 0, … , 𝑜 − 1 , 𝚾 𝑜 = 1

  • Precise linear model
  • Large CRP space
  • Vulnerable to ML attacks
slide-18
SLIDE 18

APUF, XOR APUF and iPUF [6]

18

Arbiter PUF (APUF) x-XOR Arbiter PUF Interpose PUF (iPUF)

  • Δ > 0 → 𝑠 = 1. 𝑃𝑢ℎ𝑓𝑠𝑥𝑗𝑡𝑓 𝑠 = 0
  • Δ = 𝒆𝒗𝒒𝒒𝒇𝒔 − 𝒆𝒎𝒑𝒙𝒇𝒔 = 𝒙 ⋅ 𝚾
  • 𝒙 ∶ 𝑣𝑜𝑗𝑟𝑣𝑓 𝑔𝑝𝑠 𝑏𝑜𝑧 𝐵𝑄𝑉𝐺 𝑗𝑜𝑡𝑢𝑏𝑜𝑑𝑓
  • 𝚾 𝑗𝑡 𝑢ℎ𝑓 𝑞𝑏𝑠𝑗𝑢𝑧 𝑤𝑓𝑑𝑢𝑝𝑠

𝚾 𝑗 = 𝑘=𝑗,…,𝑜−1 1 − 𝒅 𝑘 , 𝑗 = 0, … , 𝑜 − 1 , 𝚾 𝑜 = 1

  • Precise linear model
  • Large CRP space
  • Vulnerable to ML attacks
  • Precise non-linear model
  • Large CRP space
  • Secure against classical ML
  • Vulnerable to advanced ML

𝑦, 𝑧 − 𝐽𝑄𝑉𝐺 ≈ 𝑧 + 𝑦 2 − 𝑌𝑃𝑆 𝑄𝑉𝐺 if a is inserted at the middle Precise non-linear model + CRPs + classical ML = impractically softwarelly clonable

XOR APUF is not Secure against noisy CRPs + CMA-ES [Advanced ML]! (CHES2015) why? Why not for IPUF? [2]

slide-19
SLIDE 19

APUF, XOR APUF and iPUF [7]

19

Arbiter PUF (APUF) x-XOR Arbiter PUF Interpose PUF (iPUF)

𝑦, 𝑧 − 𝐽𝑄𝑉𝐺 ≈ 𝑧 + 𝑦 2 − 𝑌𝑃𝑆 𝑄𝑉𝐺 if a is inserted at the middle Precise non-linear model + CRPs + classical ML = impractically softwarelly clonable

XOR APUF is not Secure against noisy CRPs + CMA-ES [Advanced ML]! (CHES2015) why? Why not for IPUF?

  • Δ > 0 → 𝑠 = 1. 𝑃𝑢ℎ𝑓𝑠𝑥𝑗𝑡𝑓 𝑠 = 0
  • Δ = 𝒆𝒗𝒒𝒒𝒇𝒔 − 𝒆𝒎𝒑𝒙𝒇𝒔 = 𝒙 ⋅ 𝚾
  • 𝒙 ∶ 𝑣𝑜𝑗𝑟𝑣𝑓 𝑔𝑝𝑠 𝑏𝑜𝑧 𝐵𝑄𝑉𝐺 𝑗𝑜𝑡𝑢𝑏𝑜𝑑𝑓
  • 𝚾 𝑗𝑡 𝑢ℎ𝑓 𝑞𝑏𝑠𝑗𝑢𝑧 𝑤𝑓𝑑𝑢𝑝𝑠

𝚾 𝑗 = 𝑘=𝑗,…,𝑜−1 1 − 𝒅 𝑘 , 𝑗 = 0, … , 𝑜 − 1 , 𝚾 𝑜 = 1

  • Precise linear model
  • Large CRP space
  • Vulnerable to ML attacks
  • Precise non-linear model
  • Large CRP space
  • Secure against classical ML
  • Vulnerable to advanced ML
slide-20
SLIDE 20

APUF, XOR APUF and iPUF [8]

20

Arbiter PUF (APUF) x-XOR Arbiter PUF Interpose PUF (iPUF)

𝑦, 𝑧 − 𝐽𝑄𝑉𝐺 ≈ 𝑧 + 𝑦 2 − 𝑌𝑃𝑆 𝑄𝑉𝐺 if a is inserted at the middle

  • Precise non-linear model
  • Large CRP
  • Secure both classical ML and advanced ML

XOR APUF is not Secure against noisy CRPs + CMA-ES [Advanced ML]! (CHES2015) why? Why not for IPUF?

  • Δ > 0 → 𝑠 = 1. 𝑃𝑢ℎ𝑓𝑠𝑥𝑗𝑡𝑓 𝑠 = 0
  • Δ = 𝒆𝒗𝒒𝒒𝒇𝒔 − 𝒆𝒎𝒑𝒙𝒇𝒔 = 𝒙 ⋅ 𝚾
  • 𝒙 ∶ 𝑣𝑜𝑗𝑟𝑣𝑓 𝑔𝑝𝑠 𝑏𝑜𝑧 𝐵𝑄𝑉𝐺 𝑗𝑜𝑡𝑢𝑏𝑜𝑑𝑓
  • 𝚾 𝑗𝑡 𝑢ℎ𝑓 𝑞𝑏𝑠𝑗𝑢𝑧 𝑤𝑓𝑑𝑢𝑝𝑠

𝚾 𝑗 = 𝑘=𝑗,…,𝑜−1 1 − 𝒅 𝑘 , 𝑗 = 0, … , 𝑜 − 1 , 𝚾 𝑜 = 1

  • Precise linear model
  • Large CRP space
  • Vulnerable to ML attacks
  • Precise non-linear model
  • Large CRP space
  • Secure against classical ML
  • Vulnerable to advanced ML
slide-21
SLIDE 21
  • 3. Short-term Reliability

21

slide-22
SLIDE 22

Arbiter: Repeatability – short-term Reliability [1]

22

Challenge C (C,1), (C,2), …. (C,m) APUF A Responses 𝑠1, 𝑠2, . . , 𝑠𝑛 (𝑠1 = 0), (𝑠2 = 1), … . (𝑠𝑛 = 0) 𝑆 = (𝑠

1+𝑠2 + ⋯ + 𝑠 𝑛)/𝑛

Reliability Measurements Δ1, Δ2, … , Δ𝑛 Δ1 < 0, Δ2 > 0, … , Δ𝑛 < 0 Δ = 𝑥 ⋅ Φ + noise

Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 0 Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 1

𝑥

slide-23
SLIDE 23

Arbiter: Repeatability – short-term Reliability [2]

23

Challenge C (C,1), (C,2), …. (C,m) APUF A Responses 𝑠1, 𝑠2, . . , 𝑠𝑛 (𝑠1 = 0), (𝑠2 = 1), … . (𝑠𝑛 = 0) 𝑆 = (𝑠

1+𝑠2 + ⋯ + 𝑠 𝑛)/𝑛

Reliability Measurements Δ1, Δ2, … , Δ𝑛 Δ1 < 0, Δ2 > 0, … , Δ𝑛 < 0 Δ = 𝑥 ⋅ Φ + noise

Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 0 Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 1

𝑥

slide-24
SLIDE 24

Arbiter: Repeatability – short-term Reliability [3]

24

Challenge C (C,1), (C,2), …. (C,m) APUF A Responses 𝑠1, 𝑠2, . . , 𝑠𝑛 (𝑠1 = 0), (𝑠2 = 1), … . (𝑠𝑛 = 0) 𝑆 = (𝑠

1+𝑠2 + ⋯ + 𝑠 𝑛)/𝑛

Reliability Measurements Δ1, Δ2, … , Δ𝑛 Δ1 < 0, Δ2 > 0, … , Δ𝑛 < 0 Δ = 𝑥 ⋅ Φ + noise

Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 0 Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 1

𝑥

slide-25
SLIDE 25

Arbiter: Repeatability – short-term Reliability [4]

25

Challenge C (C,1), (C,2), …. (C,m) APUF A Responses 𝑠1, 𝑠2, . . , 𝑠𝑛 (𝑠1 = 0), (𝑠2 = 1), … . (𝑠𝑛 = 0) 𝑆 = (𝑠

1+𝑠2 + ⋯ + 𝑠 𝑛)/𝑛

Reliability Measurements Δ1, Δ2, … , Δ𝑛 Δ1 < 0, Δ2 > 0, … , Δ𝑛 < 0 Δ = 𝑥 ⋅ Φ + noise

slide-26
SLIDE 26

Arbiter: Repeatability – short-term Reliability [5]

26

Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 0 Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 1 𝑥 Reliable

Δ1

Challenge C (C,1), (C,2), …. (C,m) APUF A Responses 𝑠1, 𝑠2, . . , 𝑠𝑛 (𝑠1 = 0), (𝑠2 = 1), … . (𝑠𝑛 = 0) 𝑆 = (𝑠

1+𝑠2 + ⋯ + 𝑠 𝑛)/𝑛

Reliability Measurements Δ1, Δ2, … , Δ𝑛 Δ1 < 0, Δ2 > 0, … , Δ𝑛 < 0 Δ = 𝑥 ⋅ Φ + noise

Δ𝑛

slide-27
SLIDE 27

Arbiter: Repeatability – short-term Reliability [6]

27

Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 0 Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 1 𝑥 Reliable Noisy r1 rm r1 r2 rm Challenge C (C,1), (C,2), …. (C,m) APUF A Responses 𝑠1, 𝑠2, . . , 𝑠𝑛 (𝑠1 = 0), (𝑠2 = 1), … . (𝑠𝑛 = 0) 𝑆 = (𝑠

1+𝑠2 + ⋯ + 𝑠 𝑛)/𝑛

Reliability Measurements Δ1, Δ2, … , Δ𝑛 Δ1 < 0, Δ2 > 0, … , Δ𝑛 < 0 Δ = 𝑥 ⋅ Φ Δ = 𝑥 ⋅ Φ + noise

slide-28
SLIDE 28

Arbiter: Repeatability – short-term Reliability [7]

28

Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 0 Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 1 𝑥 Reliable Reliable Noisy Noisy r1 rm r1 r2 rm Challenge C (C,1), (C,2), …. (C,m) APUF A Responses 𝑠1, 𝑠2, . . , 𝑠𝑛 (𝑠1 = 0), (𝑠2 = 1), … . (𝑠𝑛 = 0) 𝑆 = (𝑠

1+𝑠2 + ⋯ + 𝑠 𝑛)/𝑛

Reliability Measurements Δ1, Δ2, … , Δ𝑛 Δ1 < 0, Δ2 > 0, … , Δ𝑛 < 0 Δ = 𝑥 ⋅ Φ Δ = 𝑥 ⋅ Φ + noise

Reliability of C and 𝑥 are related

The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs CHES, 2015, Georg T. Becker

slide-29
SLIDE 29
  • 4. Reliability based Modeling Attacks

29

slide-30
SLIDE 30

APUF

30

  • Δ > 0 → 𝑠 = 1. 𝑃𝑢ℎ𝑓𝑠𝑥𝑗𝑡𝑓 𝑠 = 0
  • Δ = 𝒆𝒗𝒒𝒒𝒇𝒔 − 𝒆𝒎𝒑𝒙𝒇𝒔 = 𝒙 ⋅ 𝚾
slide-31
SLIDE 31

Covariance Matrix Adaptation Evolution Strategy (CMA-ES) Algorithm

31

[4]

𝑥 𝑥 𝑥 𝑥 𝑥 𝑥 𝑥 𝑥 𝑥 𝑥 𝑥 𝑥 𝑥 = 𝑥 𝑥 𝑥

𝑥: 𝑓𝑡𝑢𝑗𝑛𝑏𝑢𝑝𝑠 𝑝𝑠 𝑛𝑝𝑒𝑓𝑚 𝑥: 𝑢𝑏𝑠𝑕𝑓𝑢

slide-32
SLIDE 32

Reliability-based modeling attack on APUFs using CMAES [1]

32

Δ = 𝑥 ⋅ Φ > 0, 𝑠 = 0 Δ = 𝑥 ⋅ Φ < 0, 𝑠 = 1 𝑥 Reliable Reliable Noisy r1 r2 rm r1 r2 rm Qn : noisy challenges Qr : reliable challenges

𝑅, 𝑥 𝑅: 𝑡𝑓𝑢 𝑝𝑔 𝐷𝑆𝑄𝑡 , 𝑥: 𝐵𝑄𝑉𝐺 𝑅

slide-33
SLIDE 33

Reliability-based modeling attack on APUFs using CMAES [2]

33

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration 1

𝑅, 𝜗1, 𝑥1

𝑅 → 𝑑ℎ𝑏𝑚𝑚𝑓𝑜𝑕𝑓 𝑑 → Φ 𝑑 → Δ = 𝑥1 ⋅ Φ 𝑑 Δ ≤ 𝜗1 → 𝑑ℎ𝑏𝑚𝑚𝑓𝑜𝑕𝑓 𝑑 𝑗𝑡 𝑜𝑝𝑗𝑡𝑧 Δ > 𝜗1 → 𝑑ℎ𝑏𝑚𝑚𝑓𝑜𝑕𝑓 𝑑 𝑗𝑡 𝑠𝑓𝑚𝑗𝑏𝑐𝑚𝑓 Qn : noisy Qr : reliable Model Target

slide-34
SLIDE 34

Reliability-based modeling attack on APUFs using CMAES [3]

34

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration 1 Qn Qr

𝑅, 𝜗1, 𝑥1

Qr Qn

slide-35
SLIDE 35

Reliability-based modeling attack on APUFs using CMAES [4]

35

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration 1 Qn Qr

𝑅, 𝜗1, 𝑥1

Qr Qn 𝐷𝑝𝑛𝑞𝑣𝑢𝑓 𝑢ℎ𝑓 𝑛𝑏𝑢𝑑ℎ𝑗𝑜𝑕 𝑠𝑏𝑢𝑓 𝜍1 𝑐𝑓𝑢𝑥𝑓𝑓𝑜 𝑅, 𝑥 𝑏𝑜𝑒 𝑅, 𝜗1, 𝑥1 matching not matching not 𝜍1

slide-36
SLIDE 36

Reliability-based modeling attack on APUFs using CMAES [5]

36

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration 1 Qn Qr

𝑅, 𝜗1, 𝑥1

Qr Qn Qn Qr Qr Qn Qn Qr Qr Qn Qn Qr Qr Qn

𝑅, 𝜗2, 𝑥2 𝑅, 𝜗𝑗, 𝑥𝑗 𝑅, 𝜗𝑙, 𝑥k

𝜍1 𝜍2 𝜍𝑗 𝜍𝑙

slide-37
SLIDE 37

Reliability-based modeling attack on APUFs using CMAES [6]

37

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration 1 Qn Qr

𝑅, 𝜗1, 𝑥1

Qr Qn Qn Qr Qr Qn Qn Qr Qr Qn Qn Qr Qr Qn

𝑅, 𝜗2, 𝑥2 𝑅, 𝜗𝑗, 𝑥𝑗 𝑅, 𝜗𝑙, 𝑥k

𝜍1 𝜍2 𝜍𝑗 𝜍𝑙 High matching rate: Kept Low matching rate: Discarded

slide-38
SLIDE 38

Reliability-based modeling attack on APUFs using CMAES [7]

38

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration 2 Qn Qr

𝑅, 𝜗1, 𝑥1

Qr Qn Qn Qr Qn Qr Qr Qn Qn Qr

r

𝑅, 𝜗2, 𝑥2 𝑅, 𝜗1, 𝑥1 𝑅, 𝜗𝑙, 𝑥k

𝜍1 𝜍2 𝜍1 𝜍𝑙 High matching rate: Kept generate

slide-39
SLIDE 39

Reliability-based modeling attack on APUFs using CMAES [8]

39

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration M Qn Qr

𝑅, 𝜗1, 𝑥1

Qn Qr Qn Qr

𝑅, 𝜗2, 𝑥2 𝑅, 𝜗1, 𝑥1 𝑅, 𝜗𝑙, 𝑥k

𝜍1 𝜍2 𝜍1 𝜍𝑙 High matching rate: Kept generate Qn Qr

slide-40
SLIDE 40

𝑦-XOR APUF

40

slide-41
SLIDE 41

Reliability-based modeling attack on XOR APUFs using CMAES [1]

41

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration M Qn Qr

𝑅, 𝜗1, 𝑥1

Qn Qr

𝑅, 𝜗2, 𝑥2 The model of

  • ne APUF 𝑗

among 𝑦 APUFs in 𝑦-XOR APUF

𝜍1 𝜍2 High matching rate: Kept Converge Qn Qr

XOR APUF → 𝑅

𝑥1, …., w𝑙 are STILL models of APUF

CMA-ES attack on XOR APUF

APUF 𝑗

slide-42
SLIDE 42

Reliability-based modeling attack on XOR APUFs using CMAES [2]

42

Qn : noisy Qr : reliable

𝑅, 𝑥

Iteration M Qn Qr

𝑅, 𝜗1, 𝑥1

Qn Qr

𝑅, 𝜗2, 𝑥2 The model of another APUF 𝑘 among 𝑦 APUFs in 𝑦-XOR APUF

𝜍1 𝜍2 High matching rate: Kept Converge Qn Qr

XOR APUF → 𝑅𝑜𝑓𝑥

𝑥1, …., w𝑙 are STILL models of APUF

CMA-ES attack on XOR APUF

APUF 𝑘

slide-43
SLIDE 43

Understanding Reliability based modeling attack on XOR PUF

  • Question 1: How does the attack on XOR PUF work?
  • Question 2: How can we make the attack on XOR PUF fail?

43

slide-44
SLIDE 44

Question 1: How does the attack on XOR PUF work?

44

slide-45
SLIDE 45

The noisy and reliable challenges in XOR PUF

45

Challenge-Reliability Pairs Training Data Reliable Noisy All PUF models

Q

noisy reliable reliable

Qn Qr

Q1:

noisy

Q1: reliable Qn Qr Qr APUF 1 noisy reliable Qn Qr XOR APUF noisy noisy reliable /reliable /reliable

slide-46
SLIDE 46

Key idea of the attack on XOR PUF [1]

46

Challenge-Reliability Pairs Training Data Reliable Noisy Q10 Q2 Q1 All PUF models Qi

Q Qn Qr

Qn : noisy Qr : reliable Q10 Qr Qr Qn Qr Qr Qn converge

𝑅, 𝜗𝑗, 𝑥𝑗

10-XOR APUF APUF 10

  • (1) All the models

𝑥𝑗 in CMA-ES are models of APUF

  • (2)

𝑥𝑗 can only converge to an APUF instance

  • (3) CMA ES maximizes the matching Q of

𝑥𝑗 and Q of XOR APUF

  • (1)+(2)+(3) CMA ES forces

𝑥𝑗 converges to APUF 10 because Q of APUF 10 is the representative of Q of XOR APUF.

slide-47
SLIDE 47

Key idea of the attack on XOR PUF [2]

47

Challenge-Reliability Pairs Training Data Reliable Noisy Q10 Q2 Q1 All PUF models Qi

Q Qn Qr

Qn : noisy Qr : reliable Q10 Qr Qr Qn Qr Qr Qn converge

𝑅, 𝜗𝑗, 𝑥𝑗

10-XOR APUF APUF 10

  • (1) All the models

𝑥𝑗 in CMA-ES are models of APUF

  • (2)

𝑥𝑗 can only converge to an APUF instance

  • (3) CMA ES maximizes the matching Q of

𝑥𝑗 and Q of XOR APUF

  • (1)+(2)+(3) CMA ES forces

𝑥𝑗 converges to APUF 10 because Q of APUF 10 is the representative of Q of XOR APUF.

slide-48
SLIDE 48

Key idea of the attack on XOR PUF [3]

48

Challenge-Reliability Pairs Training Data Reliable Noisy Q10 Q2 Q1 All PUF models Qi

Q Qn Qr

Qn : noisy Qr : reliable Q10 Qr Qr Qn Qr Qr Qn converge

𝑅, 𝜗𝑗, 𝑥𝑗

10-XOR APUF APUF 10

  • (1) All the models

𝑥𝑗 in CMA-ES are models of APUF

  • (2)

𝑥𝑗 can only converge to an APUF instance

  • (3) CMA ES maximizes the matching Q of

𝑥𝑗 and Q of XOR APUF

  • (1)+(2)+(3) CMA ES forces

𝑥𝑗 converges to APUF 10 because Q of APUF 10 is the representative of Q of XOR APUF.

slide-49
SLIDE 49

Key idea of the attack on XOR PUF [4]

49

Challenge-Reliability Pairs Training Data Reliable Noisy Q10 Q2 Q1 All PUF models Qi

Q Qn Qr

Qn : noisy Qr : reliable Q10 Qr Qr Qn Qr Qr Qn converge

𝑅, 𝜗𝑗, 𝑥𝑗

10-XOR APUF APUF 10

  • (1) All the models

𝑥𝑗 in CMA-ES are models of APUF

  • (2)

𝑥𝑗 can only converge to an APUF instance

  • (3) CMA ES maximizes the matching Q of

𝑥𝑗 and Q of XOR APUF

  • (1)+(2)+(3) CMA ES forces

𝑥𝑗 converges to APUF 10 because Q of APUF 10 is the representative of Q of XOR APUF.

slide-50
SLIDE 50

Key idea of the attack on XOR PUF [5]

50

Challenge-Reliability Pairs Training Data Reliable Noisy Q3 Q2 Q1 All PUF models Qi

Q Qn Qr

Qn : noisy Qr : reliable Q3 Qr Qr Qn Qr Qr Qn converge

𝑅, 𝜗𝑗, 𝑥𝑗

10-XOR APUF APUF 3

  • Changing Q makes Q3 largest
slide-51
SLIDE 51

Key idea of the attack on XOR PUF [6]

51

Challenge-Reliability Pairs Training Data Reliable Noisy Q3 Q2 Q1 All PUF models Qi

Q Qn Qr

Qn : noisy Qr : reliable Q3 Qr Qr Qn Qr Qr Qn converge

𝑅, 𝜗𝑗, 𝑥𝑗

10-XOR APUF APUF 3

  • Changing Q makes Q3 largest

Keep changing Q and applying CMA-ES attack

  • n Q to get models of all APUF instances
slide-52
SLIDE 52

Question 2: How to make the attack on XOR PUF fail?

52

slide-53
SLIDE 53

Attack fails

53

A1

Majority Voting

+

c

𝑠

CMA ES never converges to APUF A0 and always converges to APUF A1 when majority voting mechanism in use.

A0 2-XOR APUF with majority voting circuit at A0

slide-54
SLIDE 54
  • 5. Interpose PUF (iPUF) – Reliability

based modeling attack resistance

54

slide-55
SLIDE 55

Security of iPUF wrt Reliability-based modeling attack [1]

  • Reason 1: the information of APUF instances in x-XOR PUF presented at the iPUF
  • utput is less compared to APUF instances in y-XOR PUF. Thus, the reliability based

modeling attack never converges to any APUF instance in x-XOR PUF

56

slide-56
SLIDE 56

Security of iPUF wrt Reliability-based modeling attack [2]

  • Reason 2: to attack APUFs at y-XOR APUF, the adversary needs to compute Δ. But

compute Δ is infeasible because the output of x-XOR PUF (a) is not known.

57

Cannot compute Φ 𝑑 𝑝𝑠 Δ

slide-57
SLIDE 57

Other Contributions

  • Theoretical

 Enhanced Reliability based Modeling Attacks on APUF and XOR APUFs  Proved Logistic Regression on XOR APUF is the best attack  Proved Logistic Regression on iPUF is not applicable

  • Engineering

 Implemented APUF, XOR, and iPUF on FPGA  Studied good and bad FPGA-implemented APUF based PUF  All source codes available online: https://github.com/scluconn/DA_PUF_Library/

  • Detailed tutorial online:

https://www.youtube.com/playlist?list=PLK5NNs4GceLQw7bOEHSdZOwHlmSF1zvS W

58

slide-58
SLIDE 58
  • 6. Conclusion
  • We explain how the reliability-based modeling attack on XOR PUF works
  • We propose a new lightweight PUF design (iPUF) which is secure against the state-
  • f-the art of modelling attacks.

59

slide-59
SLIDE 59

Literature

1. https://slideplayer.com/slide/3927633/ 2. Cryptanalysis of electrical PUFs via machine learning algorithms – Master Thesis

  • f Jan Solter

3. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs CHES, September 16 th , 2015, Georg T. Becker 4. https://en.wikipedia.org/wiki/CMA-ES

60

Thank you for your attention! and any questions?