Robust and Lightweight Challenge Obfuscation Mechanism for Anti-modeling Protection of Arbiter-PUFs

dc.contributor.authorEbrahimabadi, Mohammad
dc.contributor.authorYounis, Mohamed
dc.contributor.authorSanjana Mehjabin, Suhee
dc.contributor.authorTekeoglu, Ali
dc.contributor.authorSookoor, Tamim I.
dc.contributor.authorKarimi, Naghmeh
dc.date.accessioned2025-01-22T21:24:29Z
dc.date.available2025-01-22T21:24:29Z
dc.date.issued2024-12-06
dc.description.abstractPhysically unclonable functions (PUFs) are lightweight hardware security primitives that leverage the imperfection of the manufacturing process of integrated circuits to generate unique signatures (responses) when queried by various bit-strings (challenges). These signatures can be used not only to authenticate interconnected devices but also to generate cryptographic keys for preserving the integrity and confidentiality of data. Among the different designs, the arbiter-PUF and its variants have received the most attention due to the large cardinality of their challenge-response set. To prevent the PUF circuits from being modeled using machine learning techniques, challenge obfuscation is often being pursued. Particularly, the simplicity of bit scrambling makes it an attractive means to achieve such a goal without diminishing the low complexity advantages of PUFs. This paper first shows that the conventional, fixed pattern-based, bit scrambling scheme is vulnerable by developing a detailed attack scenario. Then, we propose a novel lightweight dynamic challenge scrambling (DCS) mechanism that predictably varies the bit-swapping pattern per packet and per node. Such variability severely degrades the PUF modeling accuracy. The results extracted from the FPGA implementation of DCS confirm its effectiveness in thwarting PUF modeling attacks.
dc.description.sponsorshipThis work was supported at the University of Maryland Baltimore County by award #011412 from Johns Hopkins University Applied Physics Laboratory
dc.description.urihttps://link.springer.com/article/10.1007/s41635-024-00157-3
dc.format.extent12 pages
dc.genrejournal articles
dc.identifierdoi:10.13016/m23zmt-svag
dc.identifier.citationEbrahimabadi, Mohammad, Mohamed Younis, Suhee Sanjana Mehjabin, Ali Tekeoglu, Tamim I. Sookoor, and Naghmeh Karimi. 揜obust and Lightweight Challenge Obfuscation Mechanism for Anti-Modeling Protection of Arbiter-PUFs.� Journal of Hardware and Systems Security, December 6, 2024. https://doi.org/10.1007/s41635-024-00157-3.
dc.identifier.urihttps://doi.org/10.1007/s41635-024-00157-3
dc.identifier.urihttp://hdl.handle.net/11603/37366
dc.language.isoen_US
dc.publisherSpringer Nature
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Student Collection
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.relation.ispartofUMBC Faculty Collection
dc.rightsAttribution 4.0 International
dc.rights.urihttp://creativecommons.org/licenses/by/4.0
dc.subjectSecurity
dc.subjectUMBC Cybersecurity Institute
dc.subjectPUF
dc.subjectInternet of Things
dc.subjectModeling attacks
dc.titleRobust and Lightweight Challenge Obfuscation Mechanism for Anti-modeling Protection of Arbiter-PUFs
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0001-6831-8339
dcterms.creatorhttps://orcid.org/0000-0003-3865-9217
dcterms.creatorhttps://orcid.org/0009-0002-6840-2850
dcterms.creatorhttps://orcid.org/0000-0002-5825-6637

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
s41635024001573.pdf
Size:
877.91 KB
Format:
Adobe Portable Document Format