https://github.com/maoswald/cs_masters_thesis
Machine Learning Attack on Majority Based Arbiter Physical Unclonable Functions (PUFs)
https://github.com/maoswald/cs_masters_thesis
attack cma-es machine-learning-attack majority-vote physical-unclonable-functions puf unclonable xor xor-arbiter-pufs
Last synced: 2 months ago
JSON representation
Machine Learning Attack on Majority Based Arbiter Physical Unclonable Functions (PUFs)
- Host: GitHub
- URL: https://github.com/maoswald/cs_masters_thesis
- Owner: maoswald
- Created: 2017-09-29T12:31:50.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2017-09-30T15:39:11.000Z (over 7 years ago)
- Last Synced: 2025-02-12T15:56:20.381Z (4 months ago)
- Topics: attack, cma-es, machine-learning-attack, majority-vote, physical-unclonable-functions, puf, unclonable, xor, xor-arbiter-pufs
- Language: TeX
- Homepage:
- Size: 3.67 MB
- Stars: 4
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Machine Learning Attacks on Majority Based Arbiter Physical Unclonable Functions
## Master’s Thesis
Since secret keys are used as basis for several security features, e.g. encryption or authen-
tication, there is a need to protect them from unauthorized access. Physical unclonable
functions (PUFs) ought to fulfill this need with the possibility to derive secret keys from
their intrinsic hardware imperfections These imperfections are linked inseparable with
the device and can be easily used to derive secret keys from but are hard to read out.
In addition, there is a high chance that they are unique to every instance. If that is true,
they can be used to securely identify devices.Nevertheless, certain PUFs can be successfully attacked by machine learning attacks.
Machine learning attacks in combination with a feasible amount of challenge response
pairs make it possible to create models of Arbiter PUFs and XOR Arbiter PUFs, which
can be used to predict responses for unknown challenges. Large XOR Arbiter PUFs
would prevent these attacks, but suffer instability.To counteract these instabilities, the principle of majority vote is applied to Arbiter
PUFs, which are used in XOR Arbiter PUFs. Its impacts on the stability of Arbiter PUFs
and XOR Arbiter PUFs, and relevant attacks are verified by simulations. It is shown
that majority vote enables large Majority XOR Arbiter PUFs. Furthermore, this work
verifies that large Majority XOR Arbiter PUFs increase the complexity of non-invasive
attacks exponentially by linear growth of the PUF. Thus, large Majority XOR Arbiter
PUFs constitute a foundation for machine learning attack resistant PUFs. Since they are
vulnerable to invasive attacks, they do not protect secret keys completely.## Contact