The University of Southampton
University of Southampton Institutional Repository

Lightweight obfuscation techniques for modeling attacks resistant PUFs

Lightweight obfuscation techniques for modeling attacks resistant PUFs
Lightweight obfuscation techniques for modeling attacks resistant PUFs
Building lightweight security for low-cost pervasive
devices is a major challenge considering the design requirements
of a small footprint and low power consumption. Physical Unclonable
Functions (PUFs) have emerged as a promising technology to
provide a low-cost authentication for such devices. By exploiting
intrinsic manufacturing process variations, PUFs are able to
generate unique and apparently random chip identifiers. Strong-
PUFs represent a variant of PUFs that have been suggested
for lightweight authentication applications. Unfortunately, many
of the Strong-PUFs have been shown to be susceptible to
modelling attacks (i.e., using machine learning techniques) in
which an adversary has access to challenge and response pairs.
In this study, we propose an obfuscation technique during postprocessing
of Strong-PUF responses to increase the resilience
against machine learning attacks. We conduct machine learning
experiments using Support Vector Machines and Artificial Neural
Networks on two Strong-PUFs: a 32-bit Arbiter-PUF and a 2-
XOR 32-bit Arbiter-PUF. The predictability of the 32-bit Arbiter-
PUF is reduced to ~ 70% by using an obfuscation technique.
Combining the obfuscation technique with 2-XOR 32-bit Arbiter-
PUF helps to reduce the predictability to ~ 64%. More reduction
in predictability has been observed in an XOR Arbiter-PUF
because this PUF architecture has a good uniformity. The area
overhead with an obfuscation technique consumes only 788 and
1080 gate equivalents for the 32-bit Arbiter-PUF and 2-XOR 32-
bit Arbiter-PUF, respectively.
IEEE
Mispan, Mohd Syafiq
568c91c3-c200-441c-887b-8f299635b94e
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
Mispan, Mohd Syafiq
568c91c3-c200-441c-887b-8f299635b94e
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0

Mispan, Mohd Syafiq, Halak, Basel and Zwolinski, Mark (2017) Lightweight obfuscation techniques for modeling attacks resistant PUFs. In 2nd International Verification and Security Workshop: IVSW 2017. IEEE.. (doi:10.1109/IVSW.2017.8031539).

Record type: Conference or Workshop Item (Paper)

Abstract

Building lightweight security for low-cost pervasive
devices is a major challenge considering the design requirements
of a small footprint and low power consumption. Physical Unclonable
Functions (PUFs) have emerged as a promising technology to
provide a low-cost authentication for such devices. By exploiting
intrinsic manufacturing process variations, PUFs are able to
generate unique and apparently random chip identifiers. Strong-
PUFs represent a variant of PUFs that have been suggested
for lightweight authentication applications. Unfortunately, many
of the Strong-PUFs have been shown to be susceptible to
modelling attacks (i.e., using machine learning techniques) in
which an adversary has access to challenge and response pairs.
In this study, we propose an obfuscation technique during postprocessing
of Strong-PUF responses to increase the resilience
against machine learning attacks. We conduct machine learning
experiments using Support Vector Machines and Artificial Neural
Networks on two Strong-PUFs: a 32-bit Arbiter-PUF and a 2-
XOR 32-bit Arbiter-PUF. The predictability of the 32-bit Arbiter-
PUF is reduced to ~ 70% by using an obfuscation technique.
Combining the obfuscation technique with 2-XOR 32-bit Arbiter-
PUF helps to reduce the predictability to ~ 64%. More reduction
in predictability has been observed in an XOR Arbiter-PUF
because this PUF architecture has a good uniformity. The area
overhead with an obfuscation technique consumes only 788 and
1080 gate equivalents for the 32-bit Arbiter-PUF and 2-XOR 32-
bit Arbiter-PUF, respectively.

Text
IVSW_correction
Download (725kB)

More information

Published date: 3 July 2017

Identifiers

Local EPrints ID: 412725
URI: http://eprints.soton.ac.uk/id/eprint/412725
PURE UUID: fa5c91d8-8bcb-47cd-860a-b5e2dab075ea
ORCID for Basel Halak: ORCID iD orcid.org/0000-0003-3470-7226
ORCID for Mark Zwolinski: ORCID iD orcid.org/0000-0002-2230-625X

Catalogue record

Date deposited: 27 Jul 2017 16:30
Last modified: 16 Mar 2024 04:07

Export record

Altmetrics

Contributors

Author: Mohd Syafiq Mispan
Author: Basel Halak ORCID iD
Author: Mark Zwolinski ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×