Visible to the public Machine Learning-based Vulnerability Study of Interpose PUFs as Security Primitives for IoT Networks

TitleMachine Learning-based Vulnerability Study of Interpose PUFs as Security Primitives for IoT Networks
Publication TypeConference Paper
Year of Publication2021
AuthorsThapaliya, Bipana, Mursi, Khalid T., Zhuang, Yu
Conference Name2021 IEEE International Conference on Networking, Architecture and Storage (NAS)
KeywordsFPGA, Interpose PUF, machine learning, Network security, Neural Network, Neural networks, Nonhomogeneous media, physical unclonable function, pubcrawl, Reliability engineering, Resiliency, Resilient Security Architectures, Training
AbstractSecurity is of importance for communication networks, and many network nodes, like sensors and IoT devices, are resource-constrained. Physical Unclonable Functions (PUFs) leverage physical variations of the integrated circuits to produce responses unique to individual circuits and have the potential for delivering security for low-cost networks. But before a PUF can be adopted for security applications, all security vulnerabilities must be discovered. Recently, a new PUF known as Interpose PUF (IPUF) was proposed, which was tested to be secure against reliability-based modeling attacks and machine learning attacks when the attacked IPUF is of small size. A recent study showed IPUFs succumbed to a divide-and-conquer attack, and the attack method requires the position of the interpose bit known to the attacker, a condition that can be easily obfuscated by using a random interpose position. Thus, large IPUFs may still remain secure against all known modeling attacks if the interpose position is unknown to attackers. In this paper, we present a new modeling attack method of IPUFs using multilayer neural networks, and the attack method requires no knowledge of the interpose position. Our attack was tested on simulated IPUFs and silicon IPUFs implemented on FPGAs, and the results showed that many IPUFs which were resilient against existing attacks cannot withstand our new attack method, revealing a new vulnerability of IPUFs by re-defining the boundary between secure and insecure regions in the IPUF parameter space.
DOI10.1109/NAS51552.2021.9605405
Citation Keythapaliya_machine_2021