Residential College | false |
Status | 已發表Published |
Modeling Attack Resistant Strong PUF Exploiting Stagewise Obfuscated Interconnections With Improved Reliability | |
Xu, Chongyao1; Zhang, Litao1; Law, Man Kay1; Zhao, Xiaojin2; Mak, Pui In1; Martins, Rui P.1,3 | |
2023-09-15 | |
Source Publication | IEEE Internet of Things Journal |
ISSN | 2327-4662 |
Volume | 10Issue:18Pages:16300 - 16315 |
Abstract | This article presents an obfuscated-interconnection physical unclonable function (OIPUF) to resist modeling attacks. By introducing nonlinear operations through exploiting the random interconnections of delay stages, the proposed OIPUF can theoretically improve the PUF security while consuming the same hardware resources as the conventional XOR Arbiter PUF (XOR APUF). We further propose the metastability-detection (MD) arbiter to effectively improve the PUF reliability. Implemented on Xilinx Artix-7 FPGA, both the proposed (64,4)-and (64,8)-OIPUF demonstrate a good reliability and uniformity, with the proposed (64,8)-OIPUF showing a better uniqueness and strict avalanche criterion (SAC) performance. Measurement results also show that the proposed MD arbiter can reduce the bit error rate (BER) of the (64,4)-and (64,8)-OIPUF by.68 and.48 at up to 100.C, respectively. Evaluated using the Logistic Regression (LR), Artificial Neural Network (ANN), and Covariance Matrix Adaptation-Evolution Strategy (CMAES) machine learning (ML) algorithms, the proposed (64,4)-and (64,8)-OIPUF can achieve a worst case prediction accuracy of 61.47% and 50.59% with up to 10M CRPs as training set, respectively, demonstrating a significant improvement over similar prior arts. |
Keyword | Field-programmable Gate Array (Fpga) Machine Learning (Ml) Modeling Attack Obfuscated Interconnection (Oi) Physical Unclonable Function (Puf) |
DOI | 10.1109/JIOT.2023.3267657 |
URL | View the original |
Language | 英語English |
Scopus ID | 2-s2.0-85153534466 |
Fulltext Access | |
Citation statistics | |
Document Type | Journal article |
Collection | THE STATE KEY LABORATORY OF ANALOG AND MIXED-SIGNAL VLSI (UNIVERSITY OF MACAU) Faculty of Science and Technology INSTITUTE OF MICROELECTRONICS DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING |
Corresponding Author | Law, Man Kay |
Affiliation | 1.Institute of Microelectronics and FST-ECE, State Key Laboratory of Analog and Mixed-Signal VLSI, University of Macau, Macau, China 2.College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China 3.Instituto Superior Técnico, Universidade de Lisboa, Lisbon, 1049-001, Portugal |
First Author Affilication | Faculty of Science and Technology |
Corresponding Author Affilication | Faculty of Science and Technology |
Recommended Citation GB/T 7714 | Xu, Chongyao,Zhang, Litao,Law, Man Kay,et al. Modeling Attack Resistant Strong PUF Exploiting Stagewise Obfuscated Interconnections With Improved Reliability[J]. IEEE Internet of Things Journal, 2023, 10(18), 16300 - 16315. |
APA | Xu, Chongyao., Zhang, Litao., Law, Man Kay., Zhao, Xiaojin., Mak, Pui In., & Martins, Rui P. (2023). Modeling Attack Resistant Strong PUF Exploiting Stagewise Obfuscated Interconnections With Improved Reliability. IEEE Internet of Things Journal, 10(18), 16300 - 16315. |
MLA | Xu, Chongyao,et al."Modeling Attack Resistant Strong PUF Exploiting Stagewise Obfuscated Interconnections With Improved Reliability".IEEE Internet of Things Journal 10.18(2023):16300 - 16315. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment