Residential College | false |
Status | 已發表Published |
Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs | |
Xu, Chongyao1; Zhang, Jieyun1; Law, Man-Kay1; Zhao, Xiaojin2; Mak, Pui-In1; Martins, Rui P.3,4 | |
2023 | |
Source Publication | IEEE Transactions on Information Forensics and Security |
ISSN | 1556-6013 |
Volume | 18Pages:2188 - 2203 |
Abstract | This paper presents a hardware-reuse strong physical unclonable function (PUF) based on the intrinsic transfer paths (TPs) of a conventional digital multiplier to achieve a strong modeling attack resilience. With the multiplier input employed as the PUF challenge and the path delay as the entropy source, all the possible valid propagation paths from distinct input/output pairs can serve as PUF primitives. We can quantize the path delay using a time-to-digital converter (TDC), and select the suitable TDC output bits as the PUF response. We further propose a lightweight dynamic obfuscation algorithm (DOA) and a secure mutual authentication protocol to counteract modeling attacks. The proposed strong PUF using a 32 × 32 multiplier as implemented in the Xilinx ZYNQ-7000 SoC features a total of 2048 intrinsic PUF primitives, while achieving a response stream (RS) with an average of 1024 responses per TDC output bit per challenge. With Bit(5) and Bit(6) of the TDC output selected for PUF response generation, they demonstrate a measured reliability and uniqueness of up to 98.31% and 49.34%, respectively, with their excellent randomness performance as validated by the NIST SP800-22 tests. Under machine learning (ML)-based modeling attack with artificial neural network (ANN), the measured prediction accuracy of both Bit(5) and Bit(6) can still be maintained at 50% with a total of >200 million CRPs as the training set. |
Keyword | Field-programmable Gate Array (Fpga) Hardware Reuse Machine Learning (Ml) Attack Multiplier Physical Unclonable Function (Puf) Response Stream (Rs) Transfer Path (Tp) |
DOI | 10.1109/TIFS.2023.3263621 |
URL | View the original |
Indexed By | SCIE |
WOS Research Area | Computer Science ; Engineering |
WOS Subject | Computer Science, Theory & Methods ; Engineering, Electrical & Electronic |
WOS ID | WOS:000970937500006 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Scopus ID | 2-s2.0-85153390062 |
Fulltext Access | |
Citation statistics | |
Document Type | Journal article |
Collection | DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING Faculty of Science and Technology INSTITUTE OF MICROELECTRONICS |
Corresponding Author | Xu, Chongyao; Law, Man-Kay |
Affiliation | 1.Institute of Microelectronics, Faculty of Science and Technology - ECE, University of Macau, State Key Laboratory of Analog and Mixed-Signal VLSI, Macau, 999078, Macao 2.Shenzhen University, College of Electronics and Information Engineering, Shenzhen, 518060, China 3.University of Macau, State Key Laboratory of Analog and Mixed-Signal VLSI, Faculty of Science and Technology - ECE, Macau, 999078, Macao 4.Instituto Superior Técnico, Universidade de Lisboa, Lisbon, 1049-001, Portugal |
First Author Affilication | Faculty of Science and Technology |
Corresponding Author Affilication | Faculty of Science and Technology |
Recommended Citation GB/T 7714 | Xu, Chongyao,Zhang, Jieyun,Law, Man-Kay,et al. Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs[J]. IEEE Transactions on Information Forensics and Security, 2023, 18, 2188 - 2203. |
APA | Xu, Chongyao., Zhang, Jieyun., Law, Man-Kay., Zhao, Xiaojin., Mak, Pui-In., & Martins, Rui P. (2023). Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs. IEEE Transactions on Information Forensics and Security, 18, 2188 - 2203. |
MLA | Xu, Chongyao,et al."Transfer-Path-Based Hardware-Reuse Strong PUF Achieving Modeling Attack Resilience With >200 Million Training CRPs".IEEE Transactions on Information Forensics and Security 18(2023):2188 - 2203. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment