Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF

Double Arbiter PUFs (DAPUFs) were developed as a variant to XOR PUFs to improve resilience against machine learning attacks. A recent study on DAPUFs of sizes up to 4-1 DAPUFs showed that all examined DAPUFs were vulnerable to machine learning attacks when attackers have access to a large number of...

Full description

Saved in:
Bibliographic Details
Published in2020 IEEE International Conference on Big Data (Big Data) pp. 1788 - 1795
Main Authors Alamro, Meznah A., Mursi, Khalid T., Zhuang, Yu, Alkatheiri, Mohammed Saeed, Aseeri, Ahmad O.
Format Conference Proceeding
LanguageEnglish
Published IEEE 10.12.2020
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Double Arbiter PUFs (DAPUFs) were developed as a variant to XOR PUFs to improve resilience against machine learning attacks. A recent study on DAPUFs of sizes up to 4-1 DAPUFs showed that all examined DAPUFs were vulnerable to machine learning attacks when attackers have access to a large number of challenge-response pairs (CRPs) [1], [10]. In this paper, we implemented the 5-1 DAPUF on field programmable gate arrays (FPGAs), larger than all previously implemented DAPUFs, and carried out performance evaluations of 5-1 DAPUFs on various properties including response randomness, uniqueness, stability, and security vulnerability. Experimental study on 5-1 DAPUFs shows that responses from the same 5-1 DAPUF circuit to different challenges are adequately highly distinguishable from each other while responses generated on different devices to the same challenges are different enough. 5-1 DAPUF also records the highest randomness among all tested sizes of DAPUFs. However, the stability issue is exacerbated in 5-1 DAPUF, a drawback that is also revealed in earlier studies of DAPUFs. Machine learning attack experiments show that 5-1 DAPUF is more resilient than other DAPUFs, but its responses could still be modeled when an attacker is able to accumulate a large number of CRPs.
AbstractList Double Arbiter PUFs (DAPUFs) were developed as a variant to XOR PUFs to improve resilience against machine learning attacks. A recent study on DAPUFs of sizes up to 4-1 DAPUFs showed that all examined DAPUFs were vulnerable to machine learning attacks when attackers have access to a large number of challenge-response pairs (CRPs) [1], [10]. In this paper, we implemented the 5-1 DAPUF on field programmable gate arrays (FPGAs), larger than all previously implemented DAPUFs, and carried out performance evaluations of 5-1 DAPUFs on various properties including response randomness, uniqueness, stability, and security vulnerability. Experimental study on 5-1 DAPUFs shows that responses from the same 5-1 DAPUF circuit to different challenges are adequately highly distinguishable from each other while responses generated on different devices to the same challenges are different enough. 5-1 DAPUF also records the highest randomness among all tested sizes of DAPUFs. However, the stability issue is exacerbated in 5-1 DAPUF, a drawback that is also revealed in earlier studies of DAPUFs. Machine learning attack experiments show that 5-1 DAPUF is more resilient than other DAPUFs, but its responses could still be modeled when an attacker is able to accumulate a large number of CRPs.
Author Zhuang, Yu
Alamro, Meznah A.
Mursi, Khalid T.
Alkatheiri, Mohammed Saeed
Aseeri, Ahmad O.
Author_xml – sequence: 1
  givenname: Meznah A.
  surname: Alamro
  fullname: Alamro, Meznah A.
  email: meznah.alamro@ttu.edu
  organization: Texas Tech University,Department of Computer Science,Lubbock,Texas,USA
– sequence: 2
  givenname: Khalid T.
  surname: Mursi
  fullname: Mursi, Khalid T.
  email: khalid.mursi@ttu.edu
  organization: Texas Tech University,Department of Computer Science,Lubbock,Texas,USA
– sequence: 3
  givenname: Yu
  surname: Zhuang
  fullname: Zhuang, Yu
  email: yu.zhuang@ttu.edu
  organization: Texas Tech University,Department of Computer Science,Lubbock,Texas,USA
– sequence: 4
  givenname: Mohammed Saeed
  surname: Alkatheiri
  fullname: Alkatheiri, Mohammed Saeed
  email: msalkatheri@uj.edu.sa
  organization: University of Jeddah,College of Computer Science and Engineering,Jeddah,Saudi Arabia
– sequence: 5
  givenname: Ahmad O.
  surname: Aseeri
  fullname: Aseeri, Ahmad O.
  email: a.aseeri@psau.edu.sa
  organization: Prince Sattam bin Abdulaziz University,Department of Computer Science,Al-Kharj,Saudi Arabia
BookMark eNo9kLFOwzAYhI0EA5Q-AYt5gAT_dpzYEwpNC0iVqESZKzv5Uyy1TmU7Q9-eSK2Y7qS7-4Z7ILd-8EjIM7AcgOmXN7dvTDKSMc5zzjjLtagU6OKGzPVkKq6g5BLkPUnNgJF-D6dfF5NrTXJ-T5thtAekdbAuYaCbnxVtMLq9p0sfx4DUpWmD7RhcOr_SDYZ-CEfjW6TGd_8JrWPEGI_op_rgqcyANvVEeyR3vTlEnF91Rrar5Xbxka2_3j8X9TpznImUVVIpa02nSgu6L3RlWxC6kB3veKFLBmXbCa1VWfQ9QofMWKElBwFVryoQM_J0wTpE3J2CO5pw3l2vEH9P11nD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/BigData50022.2020.9378194
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781728162515
1728162513
EndPage 1795
ExternalDocumentID 9378194
Genre orig-research
GrantInformation_xml – fundername: National Science Foundation
  funderid: 10.13039/100000001
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i203t-7588bbad86b19f497bc13945d2d2496016cd399864ffe1de0ab39521317f8713
IEDL.DBID RIE
IngestDate Thu Jun 29 18:39:22 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-7588bbad86b19f497bc13945d2d2496016cd399864ffe1de0ab39521317f8713
PageCount 8
ParticipantIDs ieee_primary_9378194
PublicationCentury 2000
PublicationDate 2020-Dec.-10
PublicationDateYYYYMMDD 2020-12-10
PublicationDate_xml – month: 12
  year: 2020
  text: 2020-Dec.-10
  day: 10
PublicationDecade 2020
PublicationTitle 2020 IEEE International Conference on Big Data (Big Data)
PublicationTitleAbbrev Big Data
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.796947
Snippet Double Arbiter PUFs (DAPUFs) were developed as a variant to XOR PUFs to improve resilience against machine learning attacks. A recent study on DAPUFs of sizes...
SourceID ieee
SourceType Publisher
StartPage 1788
SubjectTerms Authentication
Big Data
Circuit stability
Double Arbiter PUF
Field programmable gate arrays
FPGA
Hardware Security
Internet of Things
Machine learning
Physical Unclonable Functions
Resilience
Security
Stability analysis
Title Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF
URI https://ieeexplore.ieee.org/document/9378194
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF3aHsSTSit-s4JHk6abzz1JNS1FqBRsobeysx9alKS06cVf72waI4oHb2GTTcLO4b3ZnfeGkJso4JpFyNyQa3An8AEcMD5zfBkFBiAWxtgT3fFTNJoFj_Nw3iC3tRZGa10Wn2nXXpZn-SqXW7tV1kUoRQALmqQZc77Tau2R68o2s3u_fElFYR3-mVVYMc-tnv_ROKXEjeEBGX99cVcu8uZuC3Dlxy8zxv_-0iHpfCv06KTGniPS0FmbFGmuN_Q5X72W7svCVjRTZMjwrml_DVZsTCezIU3Lqg06yOzuIF0WOKfqYndHJ99CAioyVd-h_drCc0PzjIZOj6Z9fFuHTIeD6cPIqboqOEvm-YWDCUICIFQSQY-bgMcgkQUGoWIKUzHrziIVspYEY2V0T2lPgM8R5JFoGMyu_GPSyvJMnxDKZWJdjqUXAmbZRoiYKR2r2BchcE-yU9K2C7ZY7XwzFtVanf09fE72bdBsqUjPuyCtYr3Vlwj4BVyVkf4EW9Gs3g
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEJ0gJupJDRi_XROPtpTt98mghaACIRESbmS_qkTTEigXf72zpZZoPHhr2mx3s3N4b3bnvQG48ZxQUQ-ZG3KN0HBszg0e29SwhefEnPssjvWNbn_gdcfO08SdVOC21MIopfLiM2Xqx_wuX6ZipY_KGgilCGDOFmwjrw68tVprB64L48zG_ew1Ypn2-KdaY0Utsxjxo3VKjhydfeh_z7kuGHk3Vxk3xecvO8b_LuoA6huNHhmW6HMIFZXUIItStSQv6fwt919muqaZIEfmH4q0FlzLjclw3CFRXrdB2ok-HySzDMcUfezuyHAjJSAskeUX0ipNPJckTYhrNEnUwr_VYdRpjx66RtFXwZhRy84MTBECzpkMPN4MYyf0uUAe6LiSSkzGtD-LkMhbAoxWrJpSWYzbIcI8Uo0Y8yv7CKpJmqhjIKEItM-xsFyOeXbMmE-l8qVvM5eHlqAnUNMbNp2vnTOmxV6d_v36Cna7o35v2nscPJ_Bng6gLhxpWudQzRYrdYHwn_HLPOpfklewKQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+International+Conference+on+Big+Data+%28Big+Data%29&rft.atitle=Does+Sophisticating+Double+Arbiter+PUF+Design+Ensure+its+Security%3F+Performance+and+Security+Assessments+on+5-1+DAPUF&rft.au=Alamro%2C+Meznah+A.&rft.au=Mursi%2C+Khalid+T.&rft.au=Zhuang%2C+Yu&rft.au=Alkatheiri%2C+Mohammed+Saeed&rft.date=2020-12-10&rft.pub=IEEE&rft.spage=1788&rft.epage=1795&rft_id=info:doi/10.1109%2FBigData50022.2020.9378194&rft.externalDocID=9378194