DocumentCode :
180783
Title :
Robust keys from physical unclonable functions
Author :
Spain, Malcolm ; Fuller, Benjamin ; Ingols, Kyle ; Cunningham, Robert
fYear :
2014
fDate :
6-7 May 2014
Firstpage :
88
Lastpage :
92
Abstract :
Weak physical unclonable functions (PUFs) can instantiate read-proof hardware tokens (Tuyls et al. 2006, CHES) where benign variation, such as changing temperature, yields a consistent key, but invasive attempts to learn the key destroy it. Previous approaches evaluate security by measuring how much an invasive attack changes the derived key (Pappu et al. 2002, Science). If some attack insufficiently changes the derived key, an expert must redesign the hardware. An unexplored alternative uses software to enhance token response to known physical attacks. Our approach draws on machine learning. We propose a variant of linear discriminant analysis (LDA), called PUF LDA, which reduces noise levels in PUF instances while enhancing changes from known attacks. We compare PUF LDA with standard techniques using an optical coating PUF and the following feature types: raw pixels, fast Fourier transform, short-time Fourier transform, and wavelets. We measure the true positive rate for valid detection at a 0% false positive rate (no mistakes on samples taken after an attack). PUF LDA improves the true positive rate from 50% on average (with a large variance across PUFs) to near 100%. While a well-designed physical process is irreplaceable, PUF LDA enables system designers to improve the PUF reliability-security tradeoff by incorporating attacks without redesigning the hardware token.
Keywords :
fast Fourier transforms; learning (artificial intelligence); security of data; wavelet transforms; PUF LDA; PUF reliability-security tradeoff; PUFs; fast Fourier transform; invasive attack; linear discriminant analysis; machine learning; noise level reduction; optical coating PUF; raw pixels; read-proof hardware tokens; security evaluation; short-time Fourier transform; wavelets; weak physical unclonable functions; Coatings; Entropy; Hardware; Principal component analysis; Security; Software; Standards;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on
Conference_Location :
Arlington, VA
Print_ISBN :
978-1-4799-4114-8
Type :
conf
DOI :
10.1109/HST.2014.6855575
Filename :
6855575
Link To Document :
بازگشت