Skip to Main Content
Frequently Asked Questions
Submit an ETD
Global Search Box
Need Help?
Keyword Search
Participating Institutions
Advanced Search
School Logo
Files
File List
Nitin_Pundir_Thesis.pdf (5.23 MB)
ETD Abstract Container
Abstract Header
Design of a Hardware Security PUF Immune to Machine Learning Attacks
Author Info
Pundir, Nitin K, Pundir
Permalink:
http://rave.ohiolink.edu/etdc/view?acc_num=toledo1513009797455883
Abstract Details
Year and Degree
2017, Master of Science, University of Toledo, Electrical Engineering.
Abstract
The technology and cyberspace sector is losing billions each year to hardware security threats. The incidents of usage of counterfeiting chips are doubling each year. The Electronic Resellers Association International (ERAI) reported that in the year 2011 more than 1300 counterfeits were reported. The incidents were double of what were reported in 2008. The report from Federal Contracts acknowledges the threats emanating from counterfeit chips and says it threatens the successful operations of US Weapon Systems. Meanwhile, electronic counterfeiting of chips continues to be a very profitable business on the dark web by crooked operatives. Physical Unclonable Functions (PUFs) are emerging as hardware security primitives to deal with security issues such as cloning, hacking, copying, and detection of Trojans. PUFs are one-way physical structures embedded in chips to generate a unique signature for each chip. The well-known silicon-based PUFs are Arbiter PUF (APUF) and Ring Oscillator PUF (ROPUF). The PUF uses timing delays caused by manufacturing process variations to generate challenge-response pairs (CRPs) unique to each chip. APUFs and ROPUFs are observed to be vulnerable to modeling attacks. In this research, a novel hybrid PUF is proposed which is a combination of both types of delay based PUFs, to generate strong cryptographic keys. The proposed design uses the CRPs of APUF and ROs of ROPUF to generate an n-bit response corresponding to an n-bit challenge, whereas primitive PUFs generate a 1-bit response for an n-bit challenge. The CRPs produced using the proposed PUF are unique and random and can be considered as cryptographic keys. The experimental results show that the uniqueness of APUF and ROPUF CRPs increase by 23% and 19%, respectively; when applied through the proposed scheme. The average passing rate for randomness is observed to be 97%. The CRPs generated from the delay based PUFs are tested against machine learning attacks. The machine learning attacks are carried out considering different scenarios where the adversary has access to 50%, 70%, 80%, and 90% of the CRPs. The models are trained for four different best-optimizing algorithms: Adagrad, Adadelta, SGD, and NAdam. The results show that even after training for the same number of epochs, the average accuracy for the proposed PUF model is 7% compared to 56% and 72% of APUF and ROPUF, respectively. The lower prediction accuracy of the proposed PUF shows that CRPs generated from the proposed scheme are far more immune to machine learning attacks when compared to other delay based PUFs.
Committee
Mohammed Niamat (Committee Chair)
Mansoor Alam (Committee Member)
Hong Wang (Committee Member)
Pages
132 p.
Subject Headings
Electrical Engineering
;
Engineering
Keywords
Arbiter PUF
;
Ring Oscillator PUF
;
Uniqueness
;
Randomness
;
Modeling Attacks
;
Machine Learning Attacks
;
NIST
;
Physical Unclonable Functions
;
Hardware Security
Recommended Citations
Refworks
EndNote
RIS
Mendeley
Citations
Pundir, Pundir, N. K. (2017).
Design of a Hardware Security PUF Immune to Machine Learning Attacks
[Master's thesis, University of Toledo]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1513009797455883
APA Style (7th edition)
Pundir, Pundir, Nitin.
Design of a Hardware Security PUF Immune to Machine Learning Attacks.
2017. University of Toledo, Master's thesis.
OhioLINK Electronic Theses and Dissertations Center
, http://rave.ohiolink.edu/etdc/view?acc_num=toledo1513009797455883.
MLA Style (8th edition)
Pundir, Pundir, Nitin. "Design of a Hardware Security PUF Immune to Machine Learning Attacks." Master's thesis, University of Toledo, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1513009797455883
Chicago Manual of Style (17th edition)
Abstract Footer
Document number:
toledo1513009797455883
Download Count:
1,615
Copyright Info
© 2017, all rights reserved.
This open access ETD is published by University of Toledo and OhioLINK.