A novel reliability attack of Physical Unclonable Functions

Read original: arXiv:2405.13147 - Published 6/11/2024 by Gaoxiang Li, Yu Zhuang
Total Score

0

📉

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • Physical Unclonable Functions (PUFs) are security primitives for IoT devices that generate unique "fingerprints" based on a device's physical characteristics.
  • While PUFs are promising, they are vulnerable to machine learning (ML) attacks, including conventional and reliability-based attacks.
  • Conventional ML attacks have exposed vulnerabilities in many PUFs, while reliability-based attacks are more powerful and can detect weaknesses in PUFs resistant to conventional attacks.
  • This paper explores the feasibility of defending against reliability-based ML attacks using reliability-enhancing techniques like majority voting, and then introduces a new attack method that can bypass this defense.

Plain English Explanation

Physical Unclonable Functions (PUFs) are a type of security technology used in IoT (Internet of Things) devices. They work by generating a unique "fingerprint" for each device based on the physical properties of the device's components. This fingerprint can be used to identify and authenticate the device, providing a secure way to protect against counterfeiting and hacking.

However, despite their strengths, PUFs are vulnerable to attacks using machine learning (ML) algorithms. Conventional ML attacks have been successful in exposing weaknesses in many PUF designs. More recently, a new type of attack called a "reliability-based" ML attack has been developed, which is even more powerful and can detect vulnerabilities in PUFs that were resistant to the earlier conventional attacks.

Reliability-based attacks work by exploiting the fact that PUFs are not perfectly reliable - they can sometimes produce slightly different outputs even when the same input is provided. The researchers in this paper were interested in whether they could build a defense against these reliability-based attacks by using techniques to improve the reliability of PUFs, such as majority voting (where the device takes multiple measurements and averages the result).

Their experiments showed that majority voting with a high number of repeats could provide an effective defense against existing reliability-based attack methods. However, the researchers then went on to develop a new attack method that was able to bypass this defense by capturing the low, but not perfectly eliminated, unreliability of the highly reliable PUFs.

Technical Explanation

This paper examines the vulnerabilities of Physical Unclonable Functions (PUFs) to machine learning (ML) attacks, particularly focusing on reliability-based attacks. PUFs are security primitives used in IoT devices that generate unique "fingerprints" based on the physical characteristics of the device.

While PUFs are promising, they have been shown to be vulnerable to conventional ML attacks that can expose their weaknesses. Reliability-based ML attacks are an even more powerful tool, leveraging information about the unreliability of PUFs to detect vulnerabilities that conventional attacks miss.

The researchers were motivated to investigate whether they could build an effective defense against reliability-based attacks by using reliability-enhancing techniques like majority voting. Their experiments showed that majority voting with a reasonably high number of repeats could provide a strong defense against existing reliability-based attack methods.

However, the researchers then developed a new attack method that was able to bypass this majority voting defense. This new attack leverages a novel reliability representation to capture the low, but not perfectly eliminated, unreliability of highly reliable PUFs enhanced with majority voting.

Critical Analysis

The researchers in this paper make a valuable contribution by exploring the use of reliability-enhancing techniques, such as majority voting, as a defense against reliability-based ML attacks on PUFs. Their finding that majority voting with a high number of repeats can effectively mitigate existing reliability-based attack methods is an important insight.

However, the researchers' subsequent development of a new attack method that can bypass this defense is a concerning limitation. It suggests that reliability-based attacks may be an ongoing challenge for PUF security, and that continued research is needed to develop more robust defenses.

Additionally, the paper does not provide much discussion of the potential real-world implications or practical applications of this research. It would be helpful to know more about the specific IoT use cases for PUFs and the potential impact of these security vulnerabilities and attacks on deployed systems.

Further research could also explore other reliability-enhancing techniques beyond majority voting, or investigate the feasibility of provably unlearnable examples as a defense against reliability-based attacks. The PVF (Parameter Vulnerability Factor) metric could also be a useful tool for analyzing the vulnerabilities of different PUF designs.

Overall, this paper highlights the ongoing challenge of securing PUFs against sophisticated ML-based attacks, and the need for continued innovation in this area to protect IoT systems.

Conclusion

This paper examines the vulnerability of Physical Unclonable Functions (PUFs) to machine learning (ML) attacks, particularly focusing on the more powerful reliability-based attacks. The researchers explore the use of reliability-enhancing techniques, such as majority voting, as a defense against these attacks, and find that this approach can be effective against existing reliability-based attack methods.

However, the researchers then develop a new attack method that is able to bypass this majority voting defense by capturing the low unreliability of highly reliable PUFs. This suggests that reliability-based attacks may be an ongoing challenge for PUF security, and that continued research is needed to develop more robust defenses.

The findings of this paper have important implications for the design and deployment of secure IoT systems using PUFs, and highlight the need for further innovation in this area to protect against sophisticated ML-based attacks.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

📉

Total Score

0

A novel reliability attack of Physical Unclonable Functions

Gaoxiang Li, Yu Zhuang

Physical Unclonable Functions (PUFs) are emerging as promising security primitives for IoT devices, providing device fingerprints based on physical characteristics. Despite their strengths, PUFs are vulnerable to machine learning (ML) attacks, including conventional and reliability-based attacks. Conventional ML attacks have been effective in revealing vulnerabilities of many PUFs, and reliability-based ML attacks are more powerful tools that have detected vulnerabilities of some PUFs that are resistant to conventional ML attacks. Since reliability-based ML attacks leverage information of PUFs' unreliability, we were tempted to examine the feasibility of building defense using reliability enhancing techniques, and have discovered that majority voting with reasonably high repeats provides effective defense against existing reliability-based ML attack methods. It is known that majority voting reduces but does not eliminate unreliability, we are motivated to investigate if new attack methods exist that can capture the low unreliability of highly but not-perfectly reliable PUFs, which led to the development of a new reliability representation and the new representation-enabled attack method that has experimentally cracked PUFs enhanced with majority voting of high repetitions.

Read more

6/11/2024

Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks
Total Score

0

Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks

Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton

Physically unclonable functions (PUFs) are designed to act as device 'fingerprints.' Given an input challenge, the PUF circuit should produce an unpredictable response for use in situations such as root-of-trust applications and other hardware-level cybersecurity applications. PUFs are typically subcircuits present within integrated circuits (ICs), and while conventional IC PUFs are well-understood, several implementations have proven vulnerable to malicious exploits, including those perpetrated by machine learning (ML)-based attacks. Such attacks can be difficult to prevent because they are often designed to work even when relatively few challenge-response pairs are known in advance. Hence the need for both more resilient PUF designs and analysis of ML-attack susceptibility. Previous work has developed a PUF for photonic integrated circuits (PICs). A PIC PUF not only produces unpredictable responses given manufacturing-introduced tolerances, but is also less prone to electromagnetic radiation eavesdropping attacks than a purely electronic IC PUF. In this work, we analyze the resilience of the proposed photonic PUF when subjected to ML-based attacks. Specifically, we describe a computational PUF model for producing the large datasets required for training ML attacks; we analyze the quality of the model; and we discuss the modeled PUF's susceptibility to ML-based attacks. We find that the modeled PUF generates distributions that resemble uniform white noise, explaining the exhibited resilience to neural-network-based attacks designed to exploit latent relationships between challenges and responses. Preliminary analysis suggests that the PUF exhibits similar resilience to generative adversarial networks, and continued development will show whether more-sophisticated ML approaches better compromise the PUF and -- if so -- how design modifications might improve resilience.

Read more

4/4/2024

🤖

Total Score

0

Securing Blockchain-based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs

Daniel Commey, Sena Hounsinou, Garth V. Crosby

This paper presents a framework for securing blockchain-based IoT systems by integrating Physical Unclonable Functions (PUFs) and Zero-Knowledge Proofs (ZKPs) within a Hyperledger Fabric environment. The proposed framework leverages PUFs for unique device identification and ZKPs for privacy-preserving authentication and transaction processing. Experimental results demonstrate the framework's feasibility, performance, and security against various attacks. This framework provides a comprehensive solution for addressing the security challenges in blockchain-based IoT systems.

Read more

5/22/2024

Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Total Score

0

Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing

Mohamadreza Rostami, Marco Chilese, Shaza Zeitouni, Rahul Kande, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi

Modern computing systems heavily rely on hardware as the root of trust. However, their increasing complexity has given rise to security-critical vulnerabilities that cross-layer at-tacks can exploit. Traditional hardware vulnerability detection methods, such as random regression and formal verification, have limitations. Random regression, while scalable, is slow in exploring hardware, and formal verification techniques are often concerned with manual effort and state explosions. Hardware fuzzing has emerged as an effective approach to exploring and detecting security vulnerabilities in large-scale designs like modern processors. They outperform traditional methods regarding coverage, scalability, and efficiency. However, state-of-the-art fuzzers struggle to achieve comprehensive coverage of intricate hardware designs within a practical timeframe, often falling short of a 70% coverage threshold. We propose a novel ML-based hardware fuzzer, ChatFuzz, to address this challenge. Ourapproach leverages LLMs like ChatGPT to understand processor language, focusing on machine codes and generating assembly code sequences. RL is integrated to guide the input generation process by rewarding the inputs using code coverage metrics. We use the open-source RISCV-based RocketCore processor as our testbed. ChatFuzz achieves condition coverage rate of 75% in just 52 minutes compared to a state-of-the-art fuzzer, which requires a lengthy 30-hour window to reach a similar condition coverage. Furthermore, our fuzzer can attain 80% coverage when provided with a limited pool of 10 simulation instances/licenses within a 130-hour window. During this time, it conducted a total of 199K test cases, of which 6K produced discrepancies with the processor's golden model. Our analysis identified more than 10 unique mismatches, including two new bugs in the RocketCore and discrepancies from the RISC-V ISA Simulator.

Read more

4/11/2024