Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms
Evolution and Optimum Seeking: The Sixth Generation
Evolution and Optimum Seeking: The Sixth Generation
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Controlled Physical Random Functions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Identification and authentication of integrated circuits: Research Articles
Concurrency and Computation: Practice & Experience - Computer Security
Pattern Recognition and Machine Learning (Information Science and Statistics)
Pattern Recognition and Machine Learning (Information Science and Statistics)
Physical unclonable functions for device authentication and secret key generation
Proceedings of the 44th annual Design Automation Conference
Towards Robust Low Cost Authentication for Pervasive Devices
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
FPGA Intrinsic PUFs and Their Use for IP Protection
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
Extended abstract: The butterfly PUF protecting IP on every FPGA
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Physical Unclonable Functions and Secure Processors
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
The Journal of Machine Learning Research
Oblivious transfer based on physical unclonable functions
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Extracting secret keys from integrated circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Read-proof hardware from protective coatings
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Security applications of diodes with unique current-voltage characteristics
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Policy gradients for cryptanalysis
ICANN'10 Proceedings of the 20th international conference on Artificial neural networks: Part III
SIMPL systems, or: can we design cryptographic hardware without secret key information?
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
Short paper: lightweight remote attestation using physical functions
Proceedings of the fourth ACM conference on Wireless network security
Hardware Trojan side-channels based on physical unclonable functions
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Side-channel analysis of PUFs and fuzzy extractors
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Coalition resistant anonymous broadcast encryption scheme based on PUF
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Device aging-based physically unclonable functions
Proceedings of the 48th Design Automation Conference
Lightweight and secure PUF key storage using limits of machine learning
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Recyclable PUFs: logically reconfigurable PUFs
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Semi-invasive EM attack on FPGA RO PUFs and countermeasures
WESS '11 Proceedings of the Workshop on Embedded Systems Security
Poster: practical embedded remote attestation using physically unclonable functions
Proceedings of the 18th ACM conference on Computer and communications security
Securing netlist-level FPGA design through exploiting process variation and degradation
Proceedings of the ACM/SIGDA international symposium on Field Programmable Gate Arrays
SIMPL systems as a keyless cryptographic and security primitive
Cryptography and Security
An attack on PUF-Based session key exchange and a hardware-based countermeasure: erasable PUFs
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Towards Practical Identification of HF RFID Devices
ACM Transactions on Information and System Security (TISSEC)
A formal definition and a new security mechanism of physical unclonable functions
MMB'12/DFT'12 Proceedings of the 16th international GI/ITG conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
PUF-Based RFID authentication protocol against secret key leakage
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Clockless physical unclonable functions
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Converse PUF-Based authentication
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Practical security analysis of PUF-based two-player protocols
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Performance and security evaluation of AES s-box-based glitch PUFs on FPGAs
SPACE'12 Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography Engineering
PHAP: Password based Hardware Authentication using PUFs
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Resilient device authentication system (RDAS) through SIOMETRICS
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
An FPGA chip identification generator using configurable ring oscillators
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
PUF-based secure test wrapper design for cryptographic SoC testing
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Efficient and secure storage of private keys for pseudonymous vehicular communication
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Strong PUFs and their (physical) unpredictability: a case study with power PUFs
Proceedings of the Workshop on Embedded Systems Security
Hi-index | 0.00 |
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. This algorithm can subsequently impersonate the PUF, and can be cloned and distributed arbitrarily. This breaks the security of essentially all applications and protocols that are based on the respective PUF. The PUFs we attacked successfully include standard Arbited PUFs and Ring Oscillator PUFs of arbitrary sizes, and XO Arbiter PUFs, Lightweight Secure PUFs, and Feed-Forward Arbiter PUFs of up to a given size and complexity. Our attacks are based upon various machine learning techniques including Logistic Regression and Evolution Strategies. Our work leads to new design requirements for secure electrical PUFs, and will be useful to PUF designers and attackers alike.