论文标题

MLMSA:多标签的多边通道信息实现了对APUF变体的深度学习攻击

MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants

论文作者

Gao, Yansong, Yao, Jianrong, Pang, Lihui, Yang, Wei, Fu, Anmin, Al-Sarawi, Said F., Abbott, Derek

论文摘要

为了提高硅的建模弹性强度不可吻合的功能(PUF),尤其是APUFS,产生了大量的挑战响应对(CRP),许多合成的APUF变体,例如Xor-apuf,Interpose-Puf(Interpose-Puf(ipuf),Interpose-PUF(IPUF),Feed-Forwardforward Apuf(ff-apapuf)和Ouax-uf,并且已分发。在检查其对弹性建模方面的安全性时,使用多个信息源,例如Power Side Channel信息(SCI)或/and和/and和/and and SCI,而SCI给出了挑战,这对他们在实践中所假定的建模弹性构成了挑战。这项工作以多标签/头深度学习模型体系结构为基础,提出了多标签多标签多方向通道信息,使深度学习攻击(MLMSA)彻底评估了上述APUF变体的建模弹性。尽管它很简单,但MLMSA还是可以成功打破大规模的APUF变体,但以前尚未实现。更确切地说,MLMSA会破坏128阶段30-Xor-apuf,(9,9) - 和(2,18)-IPUFS,以及(2,2,30)-oax-apuf当CRP,Power SCI和可靠性SCI同时同时使用时。它破坏了128阶段12-XOR-APUF和(2、2、9)-oax-apuf,即使仅利用了易于访问的可靠性SCI和CRP。 128阶段的六环FF-APUF和一环20-Xor-FF-APUF可以通过使用可靠性SCI和CRP同时破坏。所有这些攻击通常在一个小时内使用标准个人计算机完成。因此,MLMSA是评估其他现有或任何新兴的强大PUF设计的有用技术。

To improve the modeling resilience of silicon strong physical unclonable functions (PUFs), in particular, the APUFs, that yield a very large number of challenge response pairs (CRPs), a number of composited APUF variants such as XOR-APUF, interpose-PUF (iPUF), feed-forward APUF (FF-APUF),and OAX-APUF have been devised. When examining their security in terms of modeling resilience, utilizing multiple information sources such as power side channel information (SCI) or/and reliability SCI given a challenge is under-explored, which poses a challenge to their supposed modeling resilience in practice. Building upon multi-label/head deep learning model architecture,this work proposes Multi-Label Multi-Side-channel-information enabled deep learning Attacks (MLMSA) to thoroughly evaluate the modeling resilience of aforementioned APUF variants. Despite its simplicity, MLMSA can successfully break large-scaled APUF variants, which has not previously been achieved. More precisely, the MLMSA breaks 128-stage 30-XOR-APUF, (9, 9)- and (2, 18)-iPUFs, and (2, 2, 30)-OAX-APUF when CRPs, power SCI and reliability SCI are concurrently used. It breaks 128-stage 12-XOR-APUF and (2, 2, 9)-OAX-APUF even when only the easy-to-obtain reliability SCI and CRPs are exploited. The 128-stage six-loop FF-APUF and one-loop 20-XOR-FF-APUF can be broken by simultaneously using reliability SCI and CRPs. All these attacks are normally completed within an hour with a standard personalcomputer. Therefore, MLMSA is a useful technique for evaluating other existing or any emerging strong PUF designs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源