Residential Collegefalse
Status已發表Published
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks
Xu, Chongyao1; Zhang, Litao1; Mak, Pui In1; Martins, Rui P.2; Law, Man Kay1
2024-03-04
Source PublicationIEEE Transactions on Information Forensics and Security
ISSN1556-6013
Volume19Pages:3927-3942
Abstract

In this paper, we propose a fully symmetrical obfuscated-interconnection PUF (SOI PUF), which contains n delay stages with each stage having 4k obfuscated interconnections for resisting machine learning (ML)-based modeling attacks. All the delay stages contribute to k PUF primitives while achieving a 20× increase in the number of possible interconnections with the same hardware resources over similar prior arts. The SOI PUF mathematical model also theoretically demonstrates the large number of nonlinear matrix multiplications for resisting ML-based modeling attacks. We further exploit parallel weak PUF cells and propose the challenge-obfuscated SOI PUF (cSOI PUF), which can effectively prevent adversaries from bypassing unknown interconnections through reverse engineering (RE) attacks. The proposed SOI PUF and cSOI PUFs are evaluated by both software simulation and FPGA measurements. Without requiring a large k as in the existing PUF architectures, the simulation results demonstrate that the proposed SOI and cSOI PUFs can achieve a ~50% prediction accuracy for k ≥ 3, even when facing ML attacks using 5-hidden-layer Artificial Neural Network (ANN) with 40M training CRPs. Furthermore, the proposed (64,2/4/6/8)-SOI PUF and (64,2/4/6/8)-cSOI PUF implemented using Xilinx Artix-7 FPGA can both achieve a measured reliability and uniformity of >94% and ~50%, respectively. Depending on the value of k, the uniqueness ranges from 29.1% to 42.7% for SOI PUFs, and further improves to ~50% for cSOI PUFs. The resilience against Reliability-based modeling attacks, Probably Approximately Correct (PAC) attacks and Reverse-Engineering-based modeling attacks will also be discussed.

KeywordPhysical Unclonable Function (Puf) Machine Learning (Ml) Modeling Attack Symmetrical Obfuscated Interconnection (Soi) Challenge Obfuscation Reverse Engineering (Re)
DOI10.1109/TIFS.2024.3372801
URLView the original
Indexed BySCIE
Language英語English
WOS Research AreaComputer Science ; Engineering
WOS SubjectComputer Science, Theory & Methods ; Engineering, Electrical & Electronic
WOS IDWOS:001214653000031
PublisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC445 HOES LANE, PISCATAWAY, NJ 08855-4141
Scopus ID2-s2.0-85187348241
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionTHE STATE KEY LABORATORY OF ANALOG AND MIXED-SIGNAL VLSI (UNIVERSITY OF MACAU)
Faculty of Science and Technology
INSTITUTE OF MICROELECTRONICS
DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING
Corresponding AuthorLaw, Man Kay
Affiliation1.Institute of Microelectronics and FST-ECE, State Key Laboratory of Analog and Mixed-Signal VLSI, University of Macau, Macau, China
2.ECE Department, FST, State Key Laboratory of Analog and Mixed-Signal VLSI, University of Macau, Macau, China
First Author AffilicationFaculty of Science and Technology
Corresponding Author AffilicationFaculty of Science and Technology
Recommended Citation
GB/T 7714
Xu, Chongyao,Zhang, Litao,Mak, Pui In,et al. Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 3927-3942.
APA Xu, Chongyao., Zhang, Litao., Mak, Pui In., Martins, Rui P.., & Law, Man Kay (2024). Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks. IEEE Transactions on Information Forensics and Security, 19, 3927-3942.
MLA Xu, Chongyao,et al."Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks".IEEE Transactions on Information Forensics and Security 19(2024):3927-3942.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Xu, Chongyao]'s Articles
[Zhang, Litao]'s Articles
[Mak, Pui In]'s Articles
Baidu academic
Similar articles in Baidu academic
[Xu, Chongyao]'s Articles
[Zhang, Litao]'s Articles
[Mak, Pui In]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Xu, Chongyao]'s Articles
[Zhang, Litao]'s Articles
[Mak, Pui In]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.