Abstract
The XOR Arbiter PUF was introduced as a strong PUF in 2007 and was broken in 2015 by a Machine Learning (ML) attack, which allows the underlying Arbiter PUFs to be modeled individually by exploiting reliability information of the measured responses. To mitigate the reliability-based attacks, state-of-the-art understanding shows that the reliability of individual Arbiter PUFs and the overall XOR Arbiter PUF can be boosted to an arbitrarily high level, thus rendering all known reliability-based ML attacks infeasible; alternatively, an access control interface around the XOR Arbiter PUF can prevent the same challenge-response pairs from being accessed repeatedly, thus eliminating the leakage of reliability information. We show that, for the first time, a perfectly reliable XOR Arbiter PUF can be successfully attacked in a divide-and-conquer manner, meaning each underlying Arbiter PUF in an XOR Arbiter PUF can be attacked individually. This allows us to attack large XOR Arbiter PUFs efficiently, even without reliability information or any side-channel information. Our key insight is that, instead of reliability information, the responses of highly correlated challenges also reveal how close the responses are to the response decision boundary. This leads to a chosen challenge attack on XOR Arbiter PUFs by carefully choosing correlated challenges to measure and aggregate the collected information. We validate our attack by using PUF simulation, as well as an XOR Arbiter PUF implemented on FPGA. We also demonstrate that our chosen challenge methodology is compatible with the state-of-the-art combined gradient-based multi-objective optimization attack. Finally, we discuss an effective countermeasure that can prevent our attack but with a relatively large area overhead compared to the PUF itself.
| Original language | English |
|---|---|
| Pages (from-to) | 4971-4984 |
| Number of pages | 14 |
| Journal | IEEE Transactions on Information Forensics and Security |
| Volume | 20 |
| Early online date | 2 May 2025 |
| DOIs | |
| Publication status | Published - 2025 |
Bibliographical note
Publisher Copyright:© 2005-2012 IEEE.
Funding
Rdve 18 July 2024; visedre 18 January 2025 and 11 April 2025; accepted 21 April 2025. Date of publication 2 May 2025; date of current ersionv 20 May 2025. The orkw of Marten anv Dijk and Chenglu Jin asw supported in part by the Project Challenges in Cybersecurity (CiCS) of the Research Program Gravitation funded by the Dutch Research Council (NWO) under Grant 024.006.037. The associate editor coordinating the wviere of this article and vingappro it for publication asw D.r Michael Pehl. author: Niloufar Sayadi.) Niloufar Sayadi is with CWI Amsterdam, 1098 XG Amsterdam, The Netherlands, and also with the Computer Science Department, Vrije Utvn Amsterdam, 1081 HV Amsterdam, The Netherlands (e-mail: .an @.. Phuong Ha Nguyen is with e ,a San Jose, CA 95125 USA. Marten anv Dijk is with CWI Amsterdam, 1098 XG Amsterdam, The Netherlands, also with the Computer Science Department, Vrije Uni- ersiteitv Amsterdam, 1081 HV Amsterdam, The Netherlands, and also with the Department of Electrical and Computer Engineering, Uyvn of Con- necticut, Mansfield, CT 06269 USA. Chenglu Jin is with CWI Amsterdam, 1098 XG Amsterdam, The Nether-
Keywords
- chosen challenge attacks
- PUF modeling attacks
- reliability-based attacks
- XOR arbiter PUFs
Fingerprint
Dive into the research topics of 'Breaking XOR Arbiter PUFs With Chosen Challenge Attack'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver