Residential Collegefalse
Status已發表Published
Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs
Xu, Chongyao1; Zhang, Jieyun1; Law, Man-Kay1; Zhao, Xiaojin2; Mak, Pui-In1; Martins, Rui P.3,4
2023
Source PublicationIEEE Transactions on Information Forensics and Security
ISSN1556-6013
Volume18Pages:2188 - 2203
Abstract

This paper presents a hardware-reuse strong physical unclonable function (PUF) based on the intrinsic transfer paths (TPs) of a conventional digital multiplier to achieve a strong modeling attack resilience. With the multiplier input employed as the PUF challenge and the path delay as the entropy source, all the possible valid propagation paths from distinct input/output pairs can serve as PUF primitives. We can quantize the path delay using a time-to-digital converter (TDC), and select the suitable TDC output bits as the PUF response. We further propose a lightweight dynamic obfuscation algorithm (DOA) and a secure mutual authentication protocol to counteract modeling attacks. The proposed strong PUF using a 32 × 32 multiplier as implemented in the Xilinx ZYNQ-7000 SoC features a total of 2048 intrinsic PUF primitives, while achieving a response stream (RS) with an average of 1024 responses per TDC output bit per challenge. With Bit(5) and Bit(6) of the TDC output selected for PUF response generation, they demonstrate a measured reliability and uniqueness of up to 98.31% and 49.34%, respectively, with their excellent randomness performance as validated by the NIST SP800-22 tests. Under machine learning (ML)-based modeling attack with artificial neural network (ANN), the measured prediction accuracy of both Bit(5) and Bit(6) can still be maintained at 50% with a total of >200 million CRPs as the training set.

KeywordField-programmable Gate Array (Fpga) Hardware Reuse Machine Learning (Ml) Attack Multiplier Physical Unclonable Function (Puf) Response Stream (Rs) Transfer Path (Tp)
DOI10.1109/TIFS.2023.3263621
URLView the original
Indexed BySCIE
WOS Research AreaComputer Science ; Engineering
WOS SubjectComputer Science, Theory & Methods ; Engineering, Electrical & Electronic
WOS IDWOS:000970937500006
PublisherInstitute of Electrical and Electronics Engineers Inc.
Scopus ID2-s2.0-85153390062
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionDEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING
Faculty of Science and Technology
INSTITUTE OF MICROELECTRONICS
Corresponding AuthorXu, Chongyao; Law, Man-Kay
Affiliation1.Institute of Microelectronics, Faculty of Science and Technology - ECE, University of Macau, State Key Laboratory of Analog and Mixed-Signal VLSI, Macau, 999078, Macao
2.Shenzhen University, College of Electronics and Information Engineering, Shenzhen, 518060, China
3.University of Macau, State Key Laboratory of Analog and Mixed-Signal VLSI, Faculty of Science and Technology - ECE, Macau, 999078, Macao
4.Instituto Superior Técnico, Universidade de Lisboa, Lisbon, 1049-001, Portugal
First Author AffilicationFaculty of Science and Technology
Corresponding Author AffilicationFaculty of Science and Technology
Recommended Citation
GB/T 7714
Xu, Chongyao,Zhang, Jieyun,Law, Man-Kay,et al. Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs[J]. IEEE Transactions on Information Forensics and Security, 2023, 18, 2188 - 2203.
APA Xu, Chongyao., Zhang, Jieyun., Law, Man-Kay., Zhao, Xiaojin., Mak, Pui-In., & Martins, Rui P. (2023). Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs. IEEE Transactions on Information Forensics and Security, 18, 2188 - 2203.
MLA Xu, Chongyao,et al."Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs".IEEE Transactions on Information Forensics and Security 18(2023):2188 - 2203.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Xu, Chongyao]'s Articles
[Zhang, Jieyun]'s Articles
[Law, Man-Kay]'s Articles
Baidu academic
Similar articles in Baidu academic
[Xu, Chongyao]'s Articles
[Zhang, Jieyun]'s Articles
[Law, Man-Kay]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Xu, Chongyao]'s Articles
[Zhang, Jieyun]'s Articles
[Law, Man-Kay]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.