z-logo
open-access-imgOpen Access
Efficient hybrid side‐channel/machine learning attack on XOR PUFs
Author(s) -
Yu Weize,
Wen Yiming
Publication year - 2019
Publication title -
electronics letters
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.375
H-Index - 146
eISSN - 1350-911X
pISSN - 0013-5194
DOI - 10.1049/el.2019.1363
Subject(s) - arbiter , computer science , convolutional neural network , side channel attack , feature (linguistics) , correlation attack , exclusive or , channel (broadcasting) , xor gate , algorithm , artificial intelligence , pattern recognition (psychology) , cryptography , computer hardware , logic gate , computer network , philosophy , cryptanalysis , linguistics
A novel hybrid side‐channel (SC)/machine learning attack is explored in this Letter to leak the confidential information of non‐linear physical unclonable functions (PUFs): XOR arbiter PUFs. In the proposed hybrid attack, SC analyses are utilised to pre‐process the input challenge of XOR arbiter PUFs to add high correlation among all the input challenge bits. Subsequently, a convolutional neural network (CNN) attack is performed on the correlated input challenge bits to extract the critical feature among the neighbour data to significantly improve its training/testing accuracy. As shown in the results, after applying the SC analyses to add correlation for the input challenge of an XOR arbiter PUF, the training/testing accuracy of the hybrid attack can be boosted over 0.98. In contrast, the training/testing accuracy of a regular CNN attack on the XOR arbiter PUF is around 0.64 due to the lack of the corresponding correlation.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here