Policy Gradients for Cryptanalysis
So-called Physical Unclonable Functions are an emerging, new cryptographic and security primitive. They can potentially replace secret binary keys in vulnerable hardware systems and have other security advantages. In this paper, we deal with the cryptanalysis of this new primitive by use of machine learning methods. In particular, we investigate to what extent the security of circuit-based PUFs can be challenged by a new machine learning technique named Policy Gradients with Parameter-based Exploration. Our findings show that this technique has several important advantages in cryptanalysis of Physical Unclonable Functions compared to other machine learning fields and to other policy gradient methods.
Unable to display preview. Download preview PDF.
- 2.Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security-CCS, pp. 148–160 (2002)Google Scholar
- 3.Pappu, R.: Physical One-Way Functions. Phd thesis, MITGoogle Scholar
- 4.Rührmair, U., Busch, H., Katzenbeisser, S.: Strong pufs: Models, constructions and security proofs, Towards Hardware Intrinsic Security: Foundation and Practice. Springer, Heidelberg (2010)Google Scholar
- 5.Lim, D.: Extracting Secret Keys from Integrated Circuits. Msc thesis, MIT (2004)Google Scholar
- 7.Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Stoyanova, V., Schmidhuber, J.: Machine learning attacks on physical unclonable functions. In: ACM Conference on Computer and Communications Security-CCS (2010) (to be published)Google Scholar
- 8.Schwefel, H.: Evolution and Optimum Seeking: The Sixth Generation. John Wiley & Sons, Inc., New York (1993)Google Scholar
- 11.Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing techniques for hardware security. In: Proceedings of the International Test Conference (ITC), pp. 1–10 (2008)Google Scholar
- 14.Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual Design Automation Conference, vol. 14, ACM, New York (2007)Google Scholar
- 15.Lee, J., Lim, D., Gassend, B., Suh, G., Van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of the IEEE VLSI Circuits Symposium, p. 176 (2004)Google Scholar