Residential College | false |
Status | 已發表Published |
Modeling Attack Resistant Strong PUF Exploiting Obfuscated Interconnections with <0.83% Bit-Error Rate | |
Xu, Chongyao1; Zhang, Jieyun1; Law, Man-Kay1; Jiang, Yang1; Zhao, Xiaojin2; Mak, Pui-ln1; Martins, Rui P.1,2 | |
2021-12 | |
Conference Name | 2021 IEEE Asian Solid-State Circuits Conference (A-SSCC) |
Source Publication | Proceedings - A-SSCC 2021: IEEE Asian Solid-State Circuits Conference |
Conference Date | 07-10 November 2021 |
Conference Place | Busan |
Country | Korea, Republic of |
Publication Place | IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA |
Publisher | IEEE |
Abstract | Silicon-based physical unclonable functions (PUFs), which exploit the natural random entropy during the chip manufacturing process, can generate random, unique and stable responses upon an input challenge. Instead of using complex crypto-algorithms, strong PUFs having a huge number of challenge-response pairs (CRPs) can be directly employed for low-cost authentication in many emerging IoT applications [1] –[4]. Yet, they typically are vulnerable towards machine learning (ML) attacks and exhibit a high bit-error rate (BER) [1], [5]. Even though the popular PUF obfuscation approach (e.g. hash processing and linear feedback shift register) can significantly enhance the ML attack resistance, they typically require extra processing steps involving PUF responses, which can inevitably degrade the achievable BER. This work reports an obfuscated interconnection physical unclonable function (OIPUF) containing two identical Ol blocks with intertwined stagewise intermediary networks. When compared with the conventional obfuscation approach, we explore the exponential stagewise interconnection to achieve intrinsic obfuscation without requiring extra hardware resources nor sacrificing the PUF reliability. We further propose a metastability-detection arbiter (MD-arbiter) array to improve the PUF reliability, demonstrating a measured worst case BER of 0.83% and an 1162x separation between inter and intra hamming distance (HD) while attaining a ML attack prediction accuracy of ∼ 50.59% with up to 10M training CRPs. |
DOI | 10.1109/A-SSCC53895.2021.9634729 |
URL | View the original |
Indexed By | CPCI-S |
Language | 英語English |
WOS Research Area | Engineering |
WOS Subject | Engineering, Electrical & Electronic |
WOS ID | WOS:000768220800019 |
Scopus ID | 2-s2.0-85123980583 |
Fulltext Access | |
Citation statistics | |
Document Type | Conference paper |
Collection | INSTITUTE OF MICROELECTRONICS Faculty of Science and Technology DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING |
Corresponding Author | Law, Man-Kay |
Affiliation | 1.University of Macau, Macau, China 2.Shenzhen University, Shenzhen, China 3.Instituto Superior Técnico, Universidade de Lisboa, Portugal |
First Author Affilication | University of Macau |
Corresponding Author Affilication | University of Macau |
Recommended Citation GB/T 7714 | Xu, Chongyao,Zhang, Jieyun,Law, Man-Kay,et al. Modeling Attack Resistant Strong PUF Exploiting Obfuscated Interconnections with <0.83% Bit-Error Rate[C], IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA:IEEE, 2021. |
APA | Xu, Chongyao., Zhang, Jieyun., Law, Man-Kay., Jiang, Yang., Zhao, Xiaojin., Mak, Pui-ln., & Martins, Rui P. (2021). Modeling Attack Resistant Strong PUF Exploiting Obfuscated Interconnections with <0.83% Bit-Error Rate. Proceedings - A-SSCC 2021: IEEE Asian Solid-State Circuits Conference. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment