Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF
Double Arbiter PUFs (DAPUFs) were developed as a variant to XOR PUFs to improve resilience against machine learning attacks. A recent study on DAPUFs of sizes up to 4-1 DAPUFs showed that all examined DAPUFs were vulnerable to machine learning attacks when attackers have access to a large number of...
Saved in:
Published in | 2020 IEEE International Conference on Big Data (Big Data) pp. 1788 - 1795 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
10.12.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Double Arbiter PUFs (DAPUFs) were developed as a variant to XOR PUFs to improve resilience against machine learning attacks. A recent study on DAPUFs of sizes up to 4-1 DAPUFs showed that all examined DAPUFs were vulnerable to machine learning attacks when attackers have access to a large number of challenge-response pairs (CRPs) [1], [10]. In this paper, we implemented the 5-1 DAPUF on field programmable gate arrays (FPGAs), larger than all previously implemented DAPUFs, and carried out performance evaluations of 5-1 DAPUFs on various properties including response randomness, uniqueness, stability, and security vulnerability. Experimental study on 5-1 DAPUFs shows that responses from the same 5-1 DAPUF circuit to different challenges are adequately highly distinguishable from each other while responses generated on different devices to the same challenges are different enough. 5-1 DAPUF also records the highest randomness among all tested sizes of DAPUFs. However, the stability issue is exacerbated in 5-1 DAPUF, a drawback that is also revealed in earlier studies of DAPUFs. Machine learning attack experiments show that 5-1 DAPUF is more resilient than other DAPUFs, but its responses could still be modeled when an attacker is able to accumulate a large number of CRPs. |
---|---|
AbstractList | Double Arbiter PUFs (DAPUFs) were developed as a variant to XOR PUFs to improve resilience against machine learning attacks. A recent study on DAPUFs of sizes up to 4-1 DAPUFs showed that all examined DAPUFs were vulnerable to machine learning attacks when attackers have access to a large number of challenge-response pairs (CRPs) [1], [10]. In this paper, we implemented the 5-1 DAPUF on field programmable gate arrays (FPGAs), larger than all previously implemented DAPUFs, and carried out performance evaluations of 5-1 DAPUFs on various properties including response randomness, uniqueness, stability, and security vulnerability. Experimental study on 5-1 DAPUFs shows that responses from the same 5-1 DAPUF circuit to different challenges are adequately highly distinguishable from each other while responses generated on different devices to the same challenges are different enough. 5-1 DAPUF also records the highest randomness among all tested sizes of DAPUFs. However, the stability issue is exacerbated in 5-1 DAPUF, a drawback that is also revealed in earlier studies of DAPUFs. Machine learning attack experiments show that 5-1 DAPUF is more resilient than other DAPUFs, but its responses could still be modeled when an attacker is able to accumulate a large number of CRPs. |
Author | Zhuang, Yu Alamro, Meznah A. Mursi, Khalid T. Alkatheiri, Mohammed Saeed Aseeri, Ahmad O. |
Author_xml | – sequence: 1 givenname: Meznah A. surname: Alamro fullname: Alamro, Meznah A. email: meznah.alamro@ttu.edu organization: Texas Tech University,Department of Computer Science,Lubbock,Texas,USA – sequence: 2 givenname: Khalid T. surname: Mursi fullname: Mursi, Khalid T. email: khalid.mursi@ttu.edu organization: Texas Tech University,Department of Computer Science,Lubbock,Texas,USA – sequence: 3 givenname: Yu surname: Zhuang fullname: Zhuang, Yu email: yu.zhuang@ttu.edu organization: Texas Tech University,Department of Computer Science,Lubbock,Texas,USA – sequence: 4 givenname: Mohammed Saeed surname: Alkatheiri fullname: Alkatheiri, Mohammed Saeed email: msalkatheri@uj.edu.sa organization: University of Jeddah,College of Computer Science and Engineering,Jeddah,Saudi Arabia – sequence: 5 givenname: Ahmad O. surname: Aseeri fullname: Aseeri, Ahmad O. email: a.aseeri@psau.edu.sa organization: Prince Sattam bin Abdulaziz University,Department of Computer Science,Al-Kharj,Saudi Arabia |
BookMark | eNo9kLFOwzAYhI0EA5Q-AYt5gAT_dpzYEwpNC0iVqESZKzv5Uyy1TmU7Q9-eSK2Y7qS7-4Z7ILd-8EjIM7AcgOmXN7dvTDKSMc5zzjjLtagU6OKGzPVkKq6g5BLkPUnNgJF-D6dfF5NrTXJ-T5thtAekdbAuYaCbnxVtMLq9p0sfx4DUpWmD7RhcOr_SDYZ-CEfjW6TGd_8JrWPEGI_op_rgqcyANvVEeyR3vTlEnF91Rrar5Xbxka2_3j8X9TpznImUVVIpa02nSgu6L3RlWxC6kB3veKFLBmXbCa1VWfQ9QofMWKElBwFVryoQM_J0wTpE3J2CO5pw3l2vEH9P11nD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/BigData50022.2020.9378194 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781728162515 1728162513 |
EndPage | 1795 |
ExternalDocumentID | 9378194 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Science Foundation funderid: 10.13039/100000001 |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i203t-7588bbad86b19f497bc13945d2d2496016cd399864ffe1de0ab39521317f8713 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:39:22 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-7588bbad86b19f497bc13945d2d2496016cd399864ffe1de0ab39521317f8713 |
PageCount | 8 |
ParticipantIDs | ieee_primary_9378194 |
PublicationCentury | 2000 |
PublicationDate | 2020-Dec.-10 |
PublicationDateYYYYMMDD | 2020-12-10 |
PublicationDate_xml | – month: 12 year: 2020 text: 2020-Dec.-10 day: 10 |
PublicationDecade | 2020 |
PublicationTitle | 2020 IEEE International Conference on Big Data (Big Data) |
PublicationTitleAbbrev | Big Data |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.796947 |
Snippet | Double Arbiter PUFs (DAPUFs) were developed as a variant to XOR PUFs to improve resilience against machine learning attacks. A recent study on DAPUFs of sizes... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1788 |
SubjectTerms | Authentication Big Data Circuit stability Double Arbiter PUF Field programmable gate arrays FPGA Hardware Security Internet of Things Machine learning Physical Unclonable Functions Resilience Security Stability analysis |
Title | Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF |
URI | https://ieeexplore.ieee.org/document/9378194 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEF3aHsSTSit-s4JHk6abzz1JNS1FqBRsobeysx9alKS06cVf72waI4oHb2GTTcLO4b3ZnfeGkJso4JpFyNyQa3An8AEcMD5zfBkFBiAWxtgT3fFTNJoFj_Nw3iC3tRZGa10Wn2nXXpZn-SqXW7tV1kUoRQALmqQZc77Tau2R68o2s3u_fElFYR3-mVVYMc-tnv_ROKXEjeEBGX99cVcu8uZuC3Dlxy8zxv_-0iHpfCv06KTGniPS0FmbFGmuN_Q5X72W7svCVjRTZMjwrml_DVZsTCezIU3Lqg06yOzuIF0WOKfqYndHJ99CAioyVd-h_drCc0PzjIZOj6Z9fFuHTIeD6cPIqboqOEvm-YWDCUICIFQSQY-bgMcgkQUGoWIKUzHrziIVspYEY2V0T2lPgM8R5JFoGMyu_GPSyvJMnxDKZWJdjqUXAmbZRoiYKR2r2BchcE-yU9K2C7ZY7XwzFtVanf09fE72bdBsqUjPuyCtYr3Vlwj4BVyVkf4EW9Gs3g |
link.rule.ids | 310,311,783,787,792,793,799,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEJ0gJupJDRi_XROPtpTt98mghaACIRESbmS_qkTTEigXf72zpZZoPHhr2mx3s3N4b3bnvQG48ZxQUQ-ZG3KN0HBszg0e29SwhefEnPssjvWNbn_gdcfO08SdVOC21MIopfLiM2Xqx_wuX6ZipY_KGgilCGDOFmwjrw68tVprB64L48zG_ew1Ypn2-KdaY0Utsxjxo3VKjhydfeh_z7kuGHk3Vxk3xecvO8b_LuoA6huNHhmW6HMIFZXUIItStSQv6fwt919muqaZIEfmH4q0FlzLjclw3CFRXrdB2ok-HySzDMcUfezuyHAjJSAskeUX0ipNPJckTYhrNEnUwr_VYdRpjx66RtFXwZhRy84MTBECzpkMPN4MYyf0uUAe6LiSSkzGtD-LkMhbAoxWrJpSWYzbIcI8Uo0Y8yv7CKpJmqhjIKEItM-xsFyOeXbMmE-l8qVvM5eHlqAnUNMbNp2vnTOmxV6d_v36Cna7o35v2nscPJ_Bng6gLhxpWudQzRYrdYHwn_HLPOpfklewKQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+International+Conference+on+Big+Data+%28Big+Data%29&rft.atitle=Does+Sophisticating+Double+Arbiter+PUF+Design+Ensure+its+Security%3F+Performance+and+Security+Assessments+on+5-1+DAPUF&rft.au=Alamro%2C+Meznah+A.&rft.au=Mursi%2C+Khalid+T.&rft.au=Zhuang%2C+Yu&rft.au=Alkatheiri%2C+Mohammed+Saeed&rft.date=2020-12-10&rft.pub=IEEE&rft.spage=1788&rft.epage=1795&rft_id=info:doi/10.1109%2FBigData50022.2020.9378194&rft.externalDocID=9378194 |