Modeling attacks on physical unclonable functions
Author(s)
Ulrich, Ruhrmair; Sehnke, Frank; Solter, Jan; Dor, Gideon; Devadas, Srinivas; Schmidhuber, Jurgen; ... Show more Show less
Downloadccs_attack_puf.pdf (520.2Kb)
OPEN_ACCESS_POLICY
Open Access Policy
Creative Commons Attribution-Noncommercial-Share Alike
Terms of use
Metadata
Show full item recordAbstract
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. This algorithm can subsequently impersonate the PUF, and can be cloned and distributed arbitrarily. This breaks the security of essentially all applications and protocols that are based on the respective PUF. The PUFs we attacked successfully include standard Arbited PUFs and Ring Oscillator PUFs of arbitrary sizes, and XO Arbiter PUFs, Lightweight Secure PUFs, and Feed-Forward Arbiter PUFs of up to a given size and complexity. Our attacks are based upon various machine learning techniques including Logistic Regression and Evolution Strategies. Our work leads to new design requirements for secure electrical PUFs, and will be useful to PUF designers and attackers alike.
Date issued
2010-10Department
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer ScienceJournal
Proceedings of the 17th ACM conference on Computer and communications security, CCS '10
Publisher
Association for Computing Machinery (ACM)
Citation
R ührmair, Ulrich et al. “Modeling attacks on physical unclonable functions.” ACM Press, 2010. 237.
Version: Author's final manuscript
ISBN
978-1-4503-0245-6