Proceedings of the 56th Annual Design Automation Conference 2019 2019
DOI: 10.1145/3316781.3317761
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Attack against Modeling Attack on PUFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…This pulls the accuracy down and forces it to a value below τ , as confirmed by the results. As will be discussed below if the CRPs are poisoned in a periodic fashion (similar to [18]), the PUF can be modeled. Accordingly, to ensure that the proposed scheme does not follow a periodic poisoning pattern, Fig.…”
Section: A Experimental Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This pulls the accuracy down and forces it to a value below τ , as confirmed by the results. As will be discussed below if the CRPs are poisoned in a periodic fashion (similar to [18]), the PUF can be modeled. Accordingly, to ensure that the proposed scheme does not follow a periodic poisoning pattern, Fig.…”
Section: A Experimental Resultsmentioning
confidence: 99%
“…The next set of results compares the efficacy of the proposed method with the AML-based scheme presented in [18] that introduced different poisoning schemes. In [18], the response toggling decision is made either based on a combinational function applied on each challenge bit-stream (when satisfied, the PUF response is poisoned) or the poisoning is performed in a periodic fashion. Although claimed to be resilient against modeling, we were able to attack these schemes with a high success.…”
Section: A Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Tackling PUF modeling attacks via PUF response poisoning can also be realized via adversarial ML. The approach proposed in [117] sends the toggled PUF response (instead of the genuine response) whenever the challenge bit-stream follows a specific bit pattern or in a periodic manner. In the latter, the PUF response is toggled for every other N received challenges.…”
Section: B Modeling Attacks On Pufs and Robustness Enhancementsmentioning
confidence: 99%
“…For that reason, it is almost impossible to fabricate two identical chips, even with full knowledge of the original chip's design [13]. Thus, physical unclonability defines that two PUF instances should never have identical challenge-response pair (CRPs) behavior [26], making them ideal for security purposes. PUFs have been applied as an effective, lightweight mechanism for secure authentication [19] and secret key generation [24].…”
Section: Introductionmentioning
confidence: 99%