A noise bifurcation architecture for linear additive physical functions. Yu, M., Verbauwhede, I., Devadas, S., & M'Raïhi, D. In 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pages 124–129, May, 2014. doi abstract bibtex Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. Popular realizations use linear additive functions as building blocks. Security is scaled up using non-linear mixing (e.g., adding XORs). Because the responses are physically derived and thus noisy, the resulting explosion in noise impacts both the adversary (which is desirable) as well as the verifier (which is undesirable). We present the first architecture for linear additive physical functions where the noise seen by the adversary and the noise seen by the verifier are bifurcated by using a randomized decimation technique and a novel response recovery method at an authentication verification server. We allow the adversary's noise ηa → 0.50 while keeping the verifier's noise ηv constant, using a parameter-based authentication modality that does not require explicit challenge/response pair storage at the server. We present supporting data using 28nm FPGA PUF noise results as well as machine learning attack results. We demonstrate that our architecture can also withstand recent side-channel attacks that filter the noise (to clean up training challenge/response labels) prior to machine learning.
@inproceedings{yu_noise_2014,
title = {A noise bifurcation architecture for linear additive physical functions},
doi = {10.1109/HST.2014.6855582},
abstract = {Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. Popular realizations use linear additive functions as building blocks. Security is scaled up using non-linear mixing (e.g., adding XORs). Because the responses are physically derived and thus noisy, the resulting explosion in noise impacts both the adversary (which is desirable) as well as the verifier (which is undesirable). We present the first architecture for linear additive physical functions where the noise seen by the adversary and the noise seen by the verifier are bifurcated by using a randomized decimation technique and a novel response recovery method at an authentication verification server. We allow the adversary's noise ηa → 0.50 while keeping the verifier's noise ηv constant, using a parameter-based authentication modality that does not require explicit challenge/response pair storage at the server. We present supporting data using 28nm FPGA PUF noise results as well as machine learning attack results. We demonstrate that our architecture can also withstand recent side-channel attacks that filter the noise (to clean up training challenge/response labels) prior to machine learning.},
booktitle = {2014 {IEEE} {International} {Symposium} on {Hardware}-{Oriented} {Security} and {Trust} ({HOST})},
author = {Yu, Meng-Day and Verbauwhede, I. and Devadas, S. and M'Raïhi, D.},
month = may,
year = {2014},
pages = {124--129}
}
Downloads: 0
{"_id":"fk9iuysQhfGNRss69","bibbaseid":"yu-verbauwhede-devadas-mrahi-anoisebifurcationarchitectureforlinearadditivephysicalfunctions-2014","authorIDs":[],"author_short":["Yu, M.","Verbauwhede, I.","Devadas, S.","M'Raïhi, D."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"A noise bifurcation architecture for linear additive physical functions","doi":"10.1109/HST.2014.6855582","abstract":"Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. Popular realizations use linear additive functions as building blocks. Security is scaled up using non-linear mixing (e.g., adding XORs). Because the responses are physically derived and thus noisy, the resulting explosion in noise impacts both the adversary (which is desirable) as well as the verifier (which is undesirable). We present the first architecture for linear additive physical functions where the noise seen by the adversary and the noise seen by the verifier are bifurcated by using a randomized decimation technique and a novel response recovery method at an authentication verification server. We allow the adversary's noise ηa → 0.50 while keeping the verifier's noise ηv constant, using a parameter-based authentication modality that does not require explicit challenge/response pair storage at the server. We present supporting data using 28nm FPGA PUF noise results as well as machine learning attack results. We demonstrate that our architecture can also withstand recent side-channel attacks that filter the noise (to clean up training challenge/response labels) prior to machine learning.","booktitle":"2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","author":[{"propositions":[],"lastnames":["Yu"],"firstnames":["Meng-Day"],"suffixes":[]},{"propositions":[],"lastnames":["Verbauwhede"],"firstnames":["I."],"suffixes":[]},{"propositions":[],"lastnames":["Devadas"],"firstnames":["S."],"suffixes":[]},{"propositions":[],"lastnames":["M'Raïhi"],"firstnames":["D."],"suffixes":[]}],"month":"May","year":"2014","pages":"124–129","bibtex":"@inproceedings{yu_noise_2014,\n\ttitle = {A noise bifurcation architecture for linear additive physical functions},\n\tdoi = {10.1109/HST.2014.6855582},\n\tabstract = {Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. Popular realizations use linear additive functions as building blocks. Security is scaled up using non-linear mixing (e.g., adding XORs). Because the responses are physically derived and thus noisy, the resulting explosion in noise impacts both the adversary (which is desirable) as well as the verifier (which is undesirable). We present the first architecture for linear additive physical functions where the noise seen by the adversary and the noise seen by the verifier are bifurcated by using a randomized decimation technique and a novel response recovery method at an authentication verification server. We allow the adversary's noise ηa → 0.50 while keeping the verifier's noise ηv constant, using a parameter-based authentication modality that does not require explicit challenge/response pair storage at the server. We present supporting data using 28nm FPGA PUF noise results as well as machine learning attack results. We demonstrate that our architecture can also withstand recent side-channel attacks that filter the noise (to clean up training challenge/response labels) prior to machine learning.},\n\tbooktitle = {2014 {IEEE} {International} {Symposium} on {Hardware}-{Oriented} {Security} and {Trust} ({HOST})},\n\tauthor = {Yu, Meng-Day and Verbauwhede, I. and Devadas, S. and M'Raïhi, D.},\n\tmonth = may,\n\tyear = {2014},\n\tpages = {124--129}\n}\n\n","author_short":["Yu, M.","Verbauwhede, I.","Devadas, S.","M'Raïhi, D."],"key":"yu_noise_2014","id":"yu_noise_2014","bibbaseid":"yu-verbauwhede-devadas-mrahi-anoisebifurcationarchitectureforlinearadditivephysicalfunctions-2014","role":"author","urls":{},"downloads":0},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/ky25","creationDate":"2019-05-11T17:47:04.668Z","downloads":0,"keywords":[],"search_terms":["noise","bifurcation","architecture","linear","additive","physical","functions","yu","verbauwhede","devadas","m'raïhi"],"title":"A noise bifurcation architecture for linear additive physical functions","year":2014,"dataSources":["XxiQtwZYfozhQmvGR"]}