TY - JOUR
T1 - Splitting the interpose puf
T2 - A novel modeling attack strategy
AU - Wisiol, N.
AU - Mühl, C.
AU - Pirnay, N.
AU - Nguyen, P.H.
AU - Margraf, M.
AU - Seifert, J.-P.
AU - van Dijk, M.
AU - Rührmair, U.
PY - 2020
Y1 - 2020
N2 - © 2020, Ruhr-University of Bochum. All rights reserved.We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by novel machine learning strategies up to very substantial sizes and complexities. Our attacks require in the most difficult cases considerable, but realistic, numbers of CRPs, while consuming only moderate computation times, ranging from few seconds to few days. The attacks build on a new divide-and-conquer approach that allows us to model the two building blocks of the Interpose PUF separately. For non-reliability based Machine Learning (ML) attacks, this eventually leads to attack times on (kup, kdown)-Interpose PUFs that are comparable to the ones against max{kup, kdown}-XOR Arbiter PUFs, refuting the original claim that Interpose PUFs could provide security similar to (kdown +kup)-XOR Arbiter PUFs (CHES 2019). On 2 the technical side, our novel divide-and-conquer technique might also be useful in analyzing other designs, where XOR Arbiter PUF challenge bits are unknown to the attacker.
AB - © 2020, Ruhr-University of Bochum. All rights reserved.We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by novel machine learning strategies up to very substantial sizes and complexities. Our attacks require in the most difficult cases considerable, but realistic, numbers of CRPs, while consuming only moderate computation times, ranging from few seconds to few days. The attacks build on a new divide-and-conquer approach that allows us to model the two building blocks of the Interpose PUF separately. For non-reliability based Machine Learning (ML) attacks, this eventually leads to attack times on (kup, kdown)-Interpose PUFs that are comparable to the ones against max{kup, kdown}-XOR Arbiter PUFs, refuting the original claim that Interpose PUFs could provide security similar to (kdown +kup)-XOR Arbiter PUFs (CHES 2019). On 2 the technical side, our novel divide-and-conquer technique might also be useful in analyzing other designs, where XOR Arbiter PUF challenge bits are unknown to the attacker.
UR - http://www.scopus.com/inward/record.url?scp=85118419401&partnerID=8YFLogxK
U2 - 10.13154/tches.v2020.i3.97-120
DO - 10.13154/tches.v2020.i3.97-120
M3 - Article
SN - 2569-2925
VL - 2020
SP - 97
EP - 120
JO - IACR Transactions on Cryptographic Hardware and Embedded Systems
JF - IACR Transactions on Cryptographic Hardware and Embedded Systems
IS - 3
ER -