Abstract
To prevent semiconductor counterfeits, the physical unclonable functions (PUFs) have attracted attention. Since PUFs utilize the variation of semiconductor manufacturing, physical cloning of PUFs is difficult. However, the risk of machine learning attacks, which clone the function of PUFs, has been reported. In recent years, a new machine learning attack using side-channel information, such as power consumption or electromagnetic wave generated during the operation of the PUF, was reported. Therefore, to consider the security of PUFs in the future, the evaluation of the resistance of PUFs against various attacks is very important. This study proposes a new machine learning attack using power consumption waveforms for the feed-forward arbiter PUF which is one of the typical PUFs. In experiments on a field programmable gate array (FPGA), the validity of the proposed analysis method and the vulnerability of the feed-forward arbiter PUF were clarified.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ESIA: Over one million counterfeit semiconductors seized—ESIA supported customs operation with expertise. http://www.eusemiconductors.eu/images/static_website/newsroom/PR/ESIA_PR_JCO-Wafers_3Jul2017.pdf
Singh, S., Silakari, S.: An ensemble approach for cyber attack detection system: a generic framework. Int. J. Netw. Distrib. Comput. 2(2), 78–90 (2014)
Yoshikawa, M., Sugioka, K., Nozaki, Y., Asahi, K.: Secure in-vehicle systems using authentication. Int. J. Netw. Distrib. Comput. 3(3), 159–166 (2015)
Lee, J.-W., Lim, D., Gassend, B., Suh, G.E., Dijk, M.V., Debadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of IEEE VLSI Circuits Symposium, pp. 176–179 (2004)
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of 44th ACM/IEEE Design Automation Conference (DAC’07), pp. 9–14 (2007)
Shimizu, K., Suzuki, D.: Glitch PUF: extracting information from usually unwanted glitches. IEICE Trans. Fundamen. Electron. Commun. Comput. Sci. E95-A(1), 223–233 (2012)
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Proceedings of 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), LNCS 4272, pp. 63–80. Springer (2007)
Hori, Y., Kang, H., Katashita, T., Satoh, A.: Pseudo-LFSR PUF: a compact, efficient and reliable physical unclonable function. In: Proceedings of IEEE 7th International Conference on ReConFigurable Computing and FPGAs (ReConFig’11), pp. 223–228 (2011)
Lim, D.: Extracting secret keys from integrated circuits. M.S. thesis, MIT (2004)
Rührmair, U., Sölter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W., Devadas, S.: PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 8(11), 1876–1891 (2013)
Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing techniques for hardware security. In: Proceedings of IEEE International Test Conference (ITC 2008), pp. 1–10 (2008)
Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure PUFs. In: Proceedings of IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 670–673 (2008)
Mahmoud, A., Rührmair, U., Majzoobi, M., Koushanfar, F.: Combined modeling and side channel attacks on strong PUFs. IACR Cryptology ePrint Archive: Report 2013/632 (2013)
Nozaki, Y., Yoshikawa, M.: EM based machine learning attack for XOR arbiter PUF. In: Proceedings of the 2017 Asia Conference on Machine Learning and Computing (ACMLC 2017), pp. 140–144 (2017)
Kumar, R., Burleson, W.: Side-channel assisted modeling attacks on feed-forward arbiter PUFs using silicon data. In: Proceedings of RFIDSec 2015, LNCS 9440, pp. 53–67. Springer (2015)
Research Center for Information Security: Evaluation Environment for Side-channel Attacks. National Institute of Advanced Industrial Science and Technology, http://www.risec.aist.go.jp/project/sasebo/
Acknowledgements
This paper is based on results obtained from a project commissioned by the New Energy and Industrial Technology Development Organization (NEDO).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Nozaki, Y., Yoshikawa, M. (2019). Power Consumption Aware Machine Learning Attack for Feed-Forward Arbiter PUF. In: Lee, R. (eds) Computer and Information Science. ICIS 2018. Studies in Computational Intelligence, vol 791. Springer, Cham. https://doi.org/10.1007/978-3-319-98693-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-98693-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98692-0
Online ISBN: 978-3-319-98693-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)