Skip to main content

Power Consumption Aware Machine Learning Attack for Feed-Forward Arbiter PUF

  • Chapter
  • First Online:
Computer and Information Science (ICIS 2018)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 791))

Included in the following conference series:

Abstract

To prevent semiconductor counterfeits, the physical unclonable functions (PUFs) have attracted attention. Since PUFs utilize the variation of semiconductor manufacturing, physical cloning of PUFs is difficult. However, the risk of machine learning attacks, which clone the function of PUFs, has been reported. In recent years, a new machine learning attack using side-channel information, such as power consumption or electromagnetic wave generated during the operation of the PUF, was reported. Therefore, to consider the security of PUFs in the future, the evaluation of the resistance of PUFs against various attacks is very important. This study proposes a new machine learning attack using power consumption waveforms for the feed-forward arbiter PUF which is one of the typical PUFs. In experiments on a field programmable gate array (FPGA), the validity of the proposed analysis method and the vulnerability of the feed-forward arbiter PUF were clarified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ESIA: Over one million counterfeit semiconductors seized—ESIA supported customs operation with expertise. http://www.eusemiconductors.eu/images/static_website/newsroom/PR/ESIA_PR_JCO-Wafers_3Jul2017.pdf

  2. Singh, S., Silakari, S.: An ensemble approach for cyber attack detection system: a generic framework. Int. J. Netw. Distrib. Comput. 2(2), 78–90 (2014)

    Article  Google Scholar 

  3. Yoshikawa, M., Sugioka, K., Nozaki, Y., Asahi, K.: Secure in-vehicle systems using authentication. Int. J. Netw. Distrib. Comput. 3(3), 159–166 (2015)

    Article  Google Scholar 

  4. Lee, J.-W., Lim, D., Gassend, B., Suh, G.E., Dijk, M.V., Debadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of IEEE VLSI Circuits Symposium, pp. 176–179 (2004)

    Google Scholar 

  5. Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of 44th ACM/IEEE Design Automation Conference (DAC’07), pp. 9–14 (2007)

    Google Scholar 

  6. Shimizu, K., Suzuki, D.: Glitch PUF: extracting information from usually unwanted glitches. IEICE Trans. Fundamen. Electron. Commun. Comput. Sci. E95-A(1), 223–233 (2012)

    Article  Google Scholar 

  7. Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Proceedings of 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), LNCS 4272, pp. 63–80. Springer (2007)

    Google Scholar 

  8. Hori, Y., Kang, H., Katashita, T., Satoh, A.: Pseudo-LFSR PUF: a compact, efficient and reliable physical unclonable function. In: Proceedings of IEEE 7th International Conference on ReConFigurable Computing and FPGAs (ReConFig’11), pp. 223–228 (2011)

    Google Scholar 

  9. Lim, D.: Extracting secret keys from integrated circuits. M.S. thesis, MIT (2004)

    Google Scholar 

  10. Rührmair, U., Sölter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W., Devadas, S.: PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 8(11), 1876–1891 (2013)

    Article  Google Scholar 

  11. Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing techniques for hardware security. In: Proceedings of IEEE International Test Conference (ITC 2008), pp. 1–10 (2008)

    Google Scholar 

  12. Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure PUFs. In: Proceedings of IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 670–673 (2008)

    Google Scholar 

  13. Mahmoud, A., Rührmair, U., Majzoobi, M., Koushanfar, F.: Combined modeling and side channel attacks on strong PUFs. IACR Cryptology ePrint Archive: Report 2013/632 (2013)

    Google Scholar 

  14. Nozaki, Y., Yoshikawa, M.: EM based machine learning attack for XOR arbiter PUF. In: Proceedings of the 2017 Asia Conference on Machine Learning and Computing (ACMLC 2017), pp. 140–144 (2017)

    Google Scholar 

  15. Kumar, R., Burleson, W.: Side-channel assisted modeling attacks on feed-forward arbiter PUFs using silicon data. In: Proceedings of RFIDSec 2015, LNCS 9440, pp. 53–67. Springer (2015)

    Google Scholar 

  16. Research Center for Information Security: Evaluation Environment for Side-channel Attacks. National Institute of Advanced Industrial Science and Technology, http://www.risec.aist.go.jp/project/sasebo/

Download references

Acknowledgements

This paper is based on results obtained from a project commissioned by the New Energy and Industrial Technology Development Organization (NEDO).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yusuke Nozaki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nozaki, Y., Yoshikawa, M. (2019). Power Consumption Aware Machine Learning Attack for Feed-Forward Arbiter PUF. In: Lee, R. (eds) Computer and Information Science. ICIS 2018. Studies in Computational Intelligence, vol 791. Springer, Cham. https://doi.org/10.1007/978-3-319-98693-7_4

Download citation

Publish with us

Policies and ethics