Show simple item record

dc.contributor.authorUlrich, Ruhrmair
dc.contributor.authorSehnke, Frank
dc.contributor.authorSolter, Jan
dc.contributor.authorDor, Gideon
dc.contributor.authorDevadas, Srinivas
dc.contributor.authorSchmidhuber, Jurgen
dc.date.accessioned2012-07-13T12:58:17Z
dc.date.available2012-07-13T12:58:17Z
dc.date.issued2010-10
dc.identifier.isbn978-1-4503-0245-6
dc.identifier.urihttp://hdl.handle.net/1721.1/71611
dc.description.abstractWe show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. This algorithm can subsequently impersonate the PUF, and can be cloned and distributed arbitrarily. This breaks the security of essentially all applications and protocols that are based on the respective PUF. The PUFs we attacked successfully include standard Arbited PUFs and Ring Oscillator PUFs of arbitrary sizes, and XO Arbiter PUFs, Lightweight Secure PUFs, and Feed-Forward Arbiter PUFs of up to a given size and complexity. Our attacks are based upon various machine learning techniques including Logistic Regression and Evolution Strategies. Our work leads to new design requirements for secure electrical PUFs, and will be useful to PUF designers and attackers alike.en_US
dc.description.sponsorshipTechnische Universitat Munchenen_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/1866307.1866335en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceDevadas via Amy Stouten_US
dc.titleModeling attacks on physical unclonable functionsen_US
dc.typeArticleen_US
dc.identifier.citationR ührmair, Ulrich et al. “Modeling attacks on physical unclonable functions.” ACM Press, 2010. 237.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverDevadas, Srinivas
dc.contributor.mitauthorDevadas, Srinivas
dc.relation.journalProceedings of the 17th ACM conference on Computer and communications security, CCS '10en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsR ührmair, Ulrich; Sehnke, Frank; S ölter, Jan; Dror, Gideon; Devadas, Srinivas; Schmidhuber, J ürgenen
dc.identifier.orcidhttps://orcid.org/0000-0001-8253-7714
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record