Machine learning attack on hardware implementation of one-way function
Physical Unclonable Functions (PUF) with exponentially growing number of challenges is an ideal candidate to become a device authentication for Internet of Things (IoT) devices. However, recent research shows that one of the most popular type of PUF, Arbiter PUF, is prone to mathematical modelling a...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/71815 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-71815 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-718152023-07-07T17:13:15Z Machine learning attack on hardware implementation of one-way function Lauw, Andri Renardi Chang Chip Hong School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering Physical Unclonable Functions (PUF) with exponentially growing number of challenges is an ideal candidate to become a device authentication for Internet of Things (IoT) devices. However, recent research shows that one of the most popular type of PUF, Arbiter PUF, is prone to mathematical modelling attack. Machine Learning (ML) based modelling attacks are the currently most relevant and effective attack form for PUF. This project attempts to attack Arbiter PUF with several machine learning algorithms and compare their performance to obtain the most effective learning algorithm against this type of PUF. It turns out that Support Vector Machine (SVM) is the most effective learning algorithm among all the six algorithms tested (Naïve Bayes, Decision Tree, Logistic Regression, Gradient Boosting, Neural Network, and SVM) to attack the PUF in terms of effectiveness and efficiency, which has prediction accuracy of 99% with relatively small amount of training data. Furthermore, a countermeasure against machine learning attack using hash function is proposed and tested. The challenge is masked with SHA-256 hashing algorithm before fed into the PUF. The result shows that fortification of the system using a hash function greatly reduces the effectiveness of machine learning attack to PUF. It reduces the prediction accuracy from 99% to nearly 50%, which is only slightly better than random chance. The hashing algorithm breaks the linear relation between the challenges with their corresponding responses due to its non-linear nature, hence effective to shield the system against machine learning attack which leverage the linear model of the system. Bachelor of Engineering 2017-05-19T04:38:55Z 2017-05-19T04:38:55Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/71815 en Nanyang Technological University 73 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering Lauw, Andri Renardi Machine learning attack on hardware implementation of one-way function |
description |
Physical Unclonable Functions (PUF) with exponentially growing number of challenges is an ideal candidate to become a device authentication for Internet of Things (IoT) devices. However, recent research shows that one of the most popular type of PUF, Arbiter PUF, is prone to mathematical modelling attack. Machine Learning (ML) based modelling attacks are the currently most relevant and effective attack form for PUF.
This project attempts to attack Arbiter PUF with several machine learning algorithms and compare their performance to obtain the most effective learning algorithm against this type of PUF. It turns out that Support Vector Machine (SVM) is the most effective learning algorithm among all the six algorithms tested (Naïve Bayes, Decision Tree, Logistic Regression, Gradient Boosting, Neural Network, and SVM) to attack the PUF in terms of effectiveness and efficiency, which has prediction accuracy of 99% with relatively small amount of training data.
Furthermore, a countermeasure against machine learning attack using hash function is proposed and tested. The challenge is masked with SHA-256 hashing algorithm before fed into the PUF. The result shows that fortification of the system using a hash function greatly reduces the effectiveness of machine learning attack to PUF. It reduces the prediction accuracy from 99% to nearly 50%, which is only slightly better than random chance. The hashing algorithm breaks the linear relation between the challenges with their corresponding responses due to its non-linear nature, hence effective to shield the system against machine learning attack which leverage the linear model of the system. |
author2 |
Chang Chip Hong |
author_facet |
Chang Chip Hong Lauw, Andri Renardi |
format |
Final Year Project |
author |
Lauw, Andri Renardi |
author_sort |
Lauw, Andri Renardi |
title |
Machine learning attack on hardware implementation of one-way function |
title_short |
Machine learning attack on hardware implementation of one-way function |
title_full |
Machine learning attack on hardware implementation of one-way function |
title_fullStr |
Machine learning attack on hardware implementation of one-way function |
title_full_unstemmed |
Machine learning attack on hardware implementation of one-way function |
title_sort |
machine learning attack on hardware implementation of one-way function |
publishDate |
2017 |
url |
http://hdl.handle.net/10356/71815 |
_version_ |
1772828678234832896 |