Skip to main content

Side-Channel Assisted Modeling Attacks on Feed-Forward Arbiter PUFs Using Silicon Data

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9440))

Abstract

Physically Unclonable Functions (PUFs) are used for generating unique signatures from the complex manufacturing variations in integrated circuits. However, the majority of PUFs have been shown to be vulnerable to modeling attacks. In this work, we take a closer look at the vulnerability of feed-forward arbiter PUFs towards a combined side-channel and modeling attack using data measured from our 32nm test chips. The side-channel information from the feed-forward PUF construction is used as a catalyst for improving the performance of modeling attacks. This hybrid attack helps to push the prediction accuracies to very high limits (> 98.5%), especially for larger PUF circuits. The hybrid attack yields around 7% improvement in prediction rates when compared to a conventional modeling attack mounted under the presence of error-inflicted challenge-response pairs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Becker, G., Kumar, R.: Active and Passive Side-Channel Attacks on Delay based PUF Designs. Cryptology ePrint Archive, Report 2014/287 (2014)

    Google Scholar 

  2. Delvaux, J., Verbauwhede, I.: Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. In: Hardware-Oriented Security and Trust (HOST), pp. 137–142, June 2013

    Google Scholar 

  3. Delvaux, J., Verbauwhede, I.: Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes. IEEE Transactions on Circuits and Systems I: Regular Papers 61(6), 1701–1713 (2014)

    Article  Google Scholar 

  4. Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers 58(9), 1198–1210 (2009)

    Article  MathSciNet  Google Scholar 

  5. Kumar, R., Burleson, W.: Hybrid modeling attacks on current-based PUFs. In: IEEE International Conference on Computer Design (ICCD), pp. 493–496, October 2014

    Google Scholar 

  6. Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A Technique to build a secret key in integrated circuits for identification and authentication applications. In: Proc. Symposium on VLSI Circuits, pp. 176–179 (2004)

    Google Scholar 

  7. Lim, D.: Extracting secret keys from integrated circuits. Master’s thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science (2004)

    Google Scholar 

  8. Lin, L., Holcomb, D., Krishnappa, D.K., Shabadi, P., Burleson, W.: Low-power sub-threshold design of secure physical unclonable functions. In: Proc. International Symposium on Low Power Electronics Design, pp. 43–48, August 2010

    Google Scholar 

  9. Lin, L., Srivathsa, S., Krishnappa, D.K., Shabadi, P., Burleson, W.: Design and Validation of Arbiter-based PUFs for Sub-45-nm Low-Power Security Applications. IEEE Trans. on Information Forensics and Security 7(4), 1394–1403 (2012)

    Article  Google Scholar 

  10. Mahmoud, A., Rührmair, U., Majzoobi, M., Koushanfar, F.: Combined Modeling and Side Channel Attacks on Strong PUFs. Cryptology ePrint Archive, Report 2013/632 (2013)

    Google Scholar 

  11. Maiti, A., Gunreddy, V., Schaumont, P.: A Systematic method to evaluate and compare the performance of physical unclonable functions. In: Athanas, P., Pnevmatikatos, D., Sklavos, N. (eds.) Embedded Systems Design with FPGAs, pp. 245–267. Springer, New York (2013)

    Chapter  Google Scholar 

  12. Rührmair, U., Sölter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W., Devadas, S.: PUF Modeling Attacks on Simulated and Silicon Data. IEEE Transactions on Information Forensics and Security 8(11), 1876–1891 (2013)

    Article  Google Scholar 

  13. Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proc. ACM Conference on Computer and Communications Security, pp. 237–249 (2010)

    Google Scholar 

  14. Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proc. Design Automation Conference, pp. 9–14 (2007)

    Google Scholar 

  15. Xu, X., Burleson, W.: Hybrid side-channel/machine-learning attacks on PUFs: a new threat? In: Proceedings of the Conference on Design, Automation & Test in Europe, DATE 2014, pp. 349:1–349:6 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raghavan Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kumar, R., Burleson, W. (2015). Side-Channel Assisted Modeling Attacks on Feed-Forward Arbiter PUFs Using Silicon Data. In: Mangard, S., Schaumont, P. (eds) Radio Frequency Identification. RFIDSec 2015. Lecture Notes in Computer Science(), vol 9440. Springer, Cham. https://doi.org/10.1007/978-3-319-24837-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24837-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24836-3

  • Online ISBN: 978-3-319-24837-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics