2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2021
DOI: 10.1109/isvlsi51109.2021.00071
|View full text |Cite
|
Sign up to set email alerts
|

Countering PUF Modeling Attacks through Adversarial Machine Learning

Abstract: A Physically Unclonable Function (PUF) is an effective option for device authentication, especially for IoT frameworks with resource-constrained devices. However, PUFs are vulnerable to modeling attacks which build a PUF model using a small subset of its Challenge-Response Pairs (CRPs). We propose an effective countermeasure against such an attack by employing adversarial machine learning techniques that introduce errors (poison) to the adversary's model. The approach intermittently provides wrong response for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“… Contaminate the data accessible by the attackers. There are some design ideas that poison the response data collected by the attackers, and the legitimate user knows how to differentiate the true and fake responses [ 107 ]. In [ 108 ], by adding some extra models, such as PRNG and a fake PUF, an active deception protocol was guaranteed to prevent ML attacks.…”
Section: Pufmentioning
confidence: 99%
“… Contaminate the data accessible by the attackers. There are some design ideas that poison the response data collected by the attackers, and the legitimate user knows how to differentiate the true and fake responses [ 107 ]. In [ 108 ], by adding some extra models, such as PRNG and a fake PUF, an active deception protocol was guaranteed to prevent ML attacks.…”
Section: Pufmentioning
confidence: 99%
“…Thanks to being lightweight and constituting a unique electronic signature, Physically Unclonable Functions (PUFs) is deemed a promising means for generating secret keys. However, PUF-based protocols can be vulnerable to contemporary attacks such as behavior modeling, message replay, and impersonation [13]. To mitigate vulnerability to these attacks, Chatterjee et al [14] have proposed using a combination of PUFs and asymmetric cryptographic modules.…”
Section: Related Workmentioning
confidence: 99%