Design And Modelling An Attack on Multiplexer Based Physical Unclonable Function

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2020 by IJETT Journal
Volume-68 Issue-6
Year of Publication : 2020
Authors : Abhijith Manchikanti Venkata, Dinesh Reddy Jeeru, Vittal K.P.
DOI :  10.14445/22315381/IJETT-V68I6P210S

Citation 

MLA Style: Abhijith Manchikanti Venkata, Dinesh Reddy Jeeru, Vittal K.P.  "Design And Modelling An Attack on Multiplexer Based Physical Unclonable Function" International Journal of Engineering Trends and Technology 68.6(2020):63-67. 

APA Style:Abhijith Manchikanti Venkata, Dinesh Reddy Jeeru, Vittal K.P. . Design And Modelling An Attack on Multiplexer Based Physical Unclonable Function  International Journal of Engineering Trends and Technology, 68(6),63-67.

Abstract
This paper deals with study of the physical unclonable functions and specifically the design of arbiter based PUF (APUF) and extends the work on different types of attacks on the PUF designs to break the security of the device, which includes advanced computational algorithms. Machine learning (ML) based attacks are successful in attacking existing designs. So in this, the resistance of the modified, proposed design of APUF is examined by modelling the attack based on the logistic regression a MLbased algorithm. The design is validated on Basys-3 Artix -7 FPGA board with a part number (xc7a35tcpg236-1).

Reference

[1] J. Ye, Q. Guo, Y. Hu, H. Li, and X. Li, "Modeling attacks on strong physical unclonable functions strengthened by random number and weak PUF," in the 2018 IEEE 36th VLSI Test Symposium (VTS), San Francisco, CA, USA, 2018 pp. 1-6.
[2] R ührmair, Ulrich et al. “Modeling attacks on physical unclonable functions.” ACM Press, 2010. 237.
[3] D. P. Sahoo, R. S. Chakraborty, and D. Mukhopadhyay, "Towards Ideal Arbiter PUF Design on Xilinx FPGA: A Practitioner`s Perspective," 2015 Euromicro Conference on Digital System Design, Funchal, 2015, pp. 559-562.
[4] U. Rührmair and D. E. Holcomb, "PUFs at a glance," 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, 2014, pp. 1-6.
[5] S. Kumar and M. Niamat, "Machine Learning-based Modeling Attacks on a Configurable PUF," NAECON 2018 - IEEE National Aerospace and Electronics Conference, Dayton, OH, 2018, pp. 169-173.
[6] J. Ye, Y. Hu and X. Li, "RPUF: Physical Unclonable Function with Randomized Challenge to resist modeling attack," 2016 IEEE Asian Hardware-Oriented Security and Trust (Asian HOST), Yilan, 2016, pp. 1-6.
[7] Q. Guo, J. Ye, Y. Gong, Y. Hu and X. Li, "Efficient Attack on Non-linear Current Mirror PUF with Genetic Algorithm," 2016 IEEE 25th Asian Test Symposium (ATS), Hiroshima, 2016, pp. 49-54.
[8] A. Roelke and M. R. Stan, "Attacking an SRAM-Based PUF through Wear out," 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Pittsburgh, PA, 2016, pp. 206-211.
[9] Mehboob Hasan Ahmed, Rutuja Jagtap, Roopal Pantode and Prof. S. S. Phule, "An FPGA Chip Identification Generator using Configurable Ring Oscillator" IJETT International Journal of Electronics and Communication Engineering 3.4 (2016): 10-14.

Keywords
PUF, Machine Learning, Verilog, FPGA, Logistic Regression, Hardware Security.