Loading…

ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs

Physical unclonable functions (PUFs) have emerged as potent hardware primitives owing to their intrinsic properties of being secret key-free, clone-proof, and lightweight. However, PUFs cannot avoid the threats of machine learning modeling and side-channel attacks (SCAs). Nevertheless, almost all at...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on information forensics and security 2023, Vol.18, p.804-817
Main Authors: Liu, Wei, Zhang, Youwei, Tang, Yonghe, Wang, Huanwei, Wei, Qiang
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c245t-4e415200aa2085bb4e586bbeeae68eb6f90018d81ec49c32f7ce844cff123b03
container_end_page 817
container_issue
container_start_page 804
container_title IEEE transactions on information forensics and security
container_volume 18
creator Liu, Wei
Zhang, Youwei
Tang, Yonghe
Wang, Huanwei
Wei, Qiang
description Physical unclonable functions (PUFs) have emerged as potent hardware primitives owing to their intrinsic properties of being secret key-free, clone-proof, and lightweight. However, PUFs cannot avoid the threats of machine learning modeling and side-channel attacks (SCAs). Nevertheless, almost all attacks neglect the correlations between the mathematical model and side-channel models introduced by PUF internal parameters; thus, such attacks fail to exploit related data and struggle in modeling complex PUFs. To address this problem, we propose a framework for using auxiliary learning SCAs to model strong PUFs by learning multiple related tasks together. Side-channel information predictions are introduced as auxiliary tasks to facilitate the primary task of predicting response. The parameters hard for the primary task to learn can be shared by the auxiliary tasks that learn the same parameters more straightforwardly. Based on the proposed framework, we design a specific auxiliary learning power SCA that employs power level prediction as the auxiliary task. The proposed attack is implemented with the hard-parameter sharing and hierarchy sharing deep neural networks. Experimental results demonstrate that the proposed attack succeeds in modeling XOR APUF, MPUF, and iPUF and outperforms the state-of-the-art methods in modeling MPUF and iPUF. We evaluate the influences of task relatedness, architecture, and loss weight ratio. Furthermore, we propose a fine-grained classification-based method to generate the auxiliary task with an enhanced relationship to the primary task. According to the response, the class corresponding to a specific side-channel state is further divided into two subclasses. Experimental results demonstrate that the generated auxiliary task promotes performance and alleviates the adverse effects of improper architecture and parameters.
doi_str_mv 10.1109/TIFS.2022.3227445
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2022_3227445</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9973338</ieee_id><sourcerecordid>2758715790</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-4e415200aa2085bb4e586bbeeae68eb6f90018d81ec49c32f7ce844cff123b03</originalsourceid><addsrcrecordid>eNo9kFtLw0AQhRdRsFZ_gPiy4HPqXpONb6EYLUQU2z4vm-1E00u27iao_96Elj7NcDhnhvMhdEvJhFKSPixm-XzCCGMTzlgihDxDIyplHMWE0fPTTvklugphTYgQNFYj9JEVc5s94gzn3uzgx_kNrpzHy1A3nzjrfuttbfwfLsD4ZpDm9Qqi6ZdpGtjirG2N3QTcOvzqVr3wvszDNbqozDbAzXGO0SJ_WkxfouLteTbNisgyIdtIgKCSEWIMI0qWpQCp4rIEMBArKOMqJYSqlaJgRWo5qxILSghbVZTxkvAxuj-c3Xv33UFo9dp1vuk_apZIlVCZpIOLHlzWuxA8VHrv613fSFOiB3J6IKcHcvpIrs_cHTI1AJz8aZpwzhX_B9bRaGM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2758715790</pqid></control><display><type>article</type><title>ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs</title><source>IEEE Xplore (Online service)</source><creator>Liu, Wei ; Zhang, Youwei ; Tang, Yonghe ; Wang, Huanwei ; Wei, Qiang</creator><creatorcontrib>Liu, Wei ; Zhang, Youwei ; Tang, Yonghe ; Wang, Huanwei ; Wei, Qiang</creatorcontrib><description>Physical unclonable functions (PUFs) have emerged as potent hardware primitives owing to their intrinsic properties of being secret key-free, clone-proof, and lightweight. However, PUFs cannot avoid the threats of machine learning modeling and side-channel attacks (SCAs). Nevertheless, almost all attacks neglect the correlations between the mathematical model and side-channel models introduced by PUF internal parameters; thus, such attacks fail to exploit related data and struggle in modeling complex PUFs. To address this problem, we propose a framework for using auxiliary learning SCAs to model strong PUFs by learning multiple related tasks together. Side-channel information predictions are introduced as auxiliary tasks to facilitate the primary task of predicting response. The parameters hard for the primary task to learn can be shared by the auxiliary tasks that learn the same parameters more straightforwardly. Based on the proposed framework, we design a specific auxiliary learning power SCA that employs power level prediction as the auxiliary task. The proposed attack is implemented with the hard-parameter sharing and hierarchy sharing deep neural networks. Experimental results demonstrate that the proposed attack succeeds in modeling XOR APUF, MPUF, and iPUF and outperforms the state-of-the-art methods in modeling MPUF and iPUF. We evaluate the influences of task relatedness, architecture, and loss weight ratio. Furthermore, we propose a fine-grained classification-based method to generate the auxiliary task with an enhanced relationship to the primary task. According to the response, the class corresponding to a specific side-channel state is further divided into two subclasses. Experimental results demonstrate that the generated auxiliary task promotes performance and alleviates the adverse effects of improper architecture and parameters.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2022.3227445</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Artificial neural networks ; Auxiliary learning ; Computer architecture ; deep neural network ; Machine learning ; Mathematical models ; multi-task ; Neural networks ; Parameters ; physical unclonable function ; Predictive models ; Resists ; side-channel attack ; Side-channel attacks ; Task analysis</subject><ispartof>IEEE transactions on information forensics and security, 2023, Vol.18, p.804-817</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c245t-4e415200aa2085bb4e586bbeeae68eb6f90018d81ec49c32f7ce844cff123b03</cites><orcidid>0000-0001-7281-1206 ; 0000-0002-0896-0458</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9973338$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,4012,27906,27907,27908,54779</link.rule.ids></links><search><creatorcontrib>Liu, Wei</creatorcontrib><creatorcontrib>Zhang, Youwei</creatorcontrib><creatorcontrib>Tang, Yonghe</creatorcontrib><creatorcontrib>Wang, Huanwei</creatorcontrib><creatorcontrib>Wei, Qiang</creatorcontrib><title>ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Physical unclonable functions (PUFs) have emerged as potent hardware primitives owing to their intrinsic properties of being secret key-free, clone-proof, and lightweight. However, PUFs cannot avoid the threats of machine learning modeling and side-channel attacks (SCAs). Nevertheless, almost all attacks neglect the correlations between the mathematical model and side-channel models introduced by PUF internal parameters; thus, such attacks fail to exploit related data and struggle in modeling complex PUFs. To address this problem, we propose a framework for using auxiliary learning SCAs to model strong PUFs by learning multiple related tasks together. Side-channel information predictions are introduced as auxiliary tasks to facilitate the primary task of predicting response. The parameters hard for the primary task to learn can be shared by the auxiliary tasks that learn the same parameters more straightforwardly. Based on the proposed framework, we design a specific auxiliary learning power SCA that employs power level prediction as the auxiliary task. The proposed attack is implemented with the hard-parameter sharing and hierarchy sharing deep neural networks. Experimental results demonstrate that the proposed attack succeeds in modeling XOR APUF, MPUF, and iPUF and outperforms the state-of-the-art methods in modeling MPUF and iPUF. We evaluate the influences of task relatedness, architecture, and loss weight ratio. Furthermore, we propose a fine-grained classification-based method to generate the auxiliary task with an enhanced relationship to the primary task. According to the response, the class corresponding to a specific side-channel state is further divided into two subclasses. Experimental results demonstrate that the generated auxiliary task promotes performance and alleviates the adverse effects of improper architecture and parameters.</description><subject>Artificial neural networks</subject><subject>Auxiliary learning</subject><subject>Computer architecture</subject><subject>deep neural network</subject><subject>Machine learning</subject><subject>Mathematical models</subject><subject>multi-task</subject><subject>Neural networks</subject><subject>Parameters</subject><subject>physical unclonable function</subject><subject>Predictive models</subject><subject>Resists</subject><subject>side-channel attack</subject><subject>Side-channel attacks</subject><subject>Task analysis</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNo9kFtLw0AQhRdRsFZ_gPiy4HPqXpONb6EYLUQU2z4vm-1E00u27iao_96Elj7NcDhnhvMhdEvJhFKSPixm-XzCCGMTzlgihDxDIyplHMWE0fPTTvklugphTYgQNFYj9JEVc5s94gzn3uzgx_kNrpzHy1A3nzjrfuttbfwfLsD4ZpDm9Qqi6ZdpGtjirG2N3QTcOvzqVr3wvszDNbqozDbAzXGO0SJ_WkxfouLteTbNisgyIdtIgKCSEWIMI0qWpQCp4rIEMBArKOMqJYSqlaJgRWo5qxILSghbVZTxkvAxuj-c3Xv33UFo9dp1vuk_apZIlVCZpIOLHlzWuxA8VHrv613fSFOiB3J6IKcHcvpIrs_cHTI1AJz8aZpwzhX_B9bRaGM</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Liu, Wei</creator><creator>Zhang, Youwei</creator><creator>Tang, Yonghe</creator><creator>Wang, Huanwei</creator><creator>Wei, Qiang</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-7281-1206</orcidid><orcidid>https://orcid.org/0000-0002-0896-0458</orcidid></search><sort><creationdate>2023</creationdate><title>ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs</title><author>Liu, Wei ; Zhang, Youwei ; Tang, Yonghe ; Wang, Huanwei ; Wei, Qiang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-4e415200aa2085bb4e586bbeeae68eb6f90018d81ec49c32f7ce844cff123b03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Artificial neural networks</topic><topic>Auxiliary learning</topic><topic>Computer architecture</topic><topic>deep neural network</topic><topic>Machine learning</topic><topic>Mathematical models</topic><topic>multi-task</topic><topic>Neural networks</topic><topic>Parameters</topic><topic>physical unclonable function</topic><topic>Predictive models</topic><topic>Resists</topic><topic>side-channel attack</topic><topic>Side-channel attacks</topic><topic>Task analysis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Wei</creatorcontrib><creatorcontrib>Zhang, Youwei</creatorcontrib><creatorcontrib>Tang, Yonghe</creatorcontrib><creatorcontrib>Wang, Huanwei</creatorcontrib><creatorcontrib>Wei, Qiang</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Wei</au><au>Zhang, Youwei</au><au>Tang, Yonghe</au><au>Wang, Huanwei</au><au>Wei, Qiang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2023</date><risdate>2023</risdate><volume>18</volume><spage>804</spage><epage>817</epage><pages>804-817</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Physical unclonable functions (PUFs) have emerged as potent hardware primitives owing to their intrinsic properties of being secret key-free, clone-proof, and lightweight. However, PUFs cannot avoid the threats of machine learning modeling and side-channel attacks (SCAs). Nevertheless, almost all attacks neglect the correlations between the mathematical model and side-channel models introduced by PUF internal parameters; thus, such attacks fail to exploit related data and struggle in modeling complex PUFs. To address this problem, we propose a framework for using auxiliary learning SCAs to model strong PUFs by learning multiple related tasks together. Side-channel information predictions are introduced as auxiliary tasks to facilitate the primary task of predicting response. The parameters hard for the primary task to learn can be shared by the auxiliary tasks that learn the same parameters more straightforwardly. Based on the proposed framework, we design a specific auxiliary learning power SCA that employs power level prediction as the auxiliary task. The proposed attack is implemented with the hard-parameter sharing and hierarchy sharing deep neural networks. Experimental results demonstrate that the proposed attack succeeds in modeling XOR APUF, MPUF, and iPUF and outperforms the state-of-the-art methods in modeling MPUF and iPUF. We evaluate the influences of task relatedness, architecture, and loss weight ratio. Furthermore, we propose a fine-grained classification-based method to generate the auxiliary task with an enhanced relationship to the primary task. According to the response, the class corresponding to a specific side-channel state is further divided into two subclasses. Experimental results demonstrate that the generated auxiliary task promotes performance and alleviates the adverse effects of improper architecture and parameters.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2022.3227445</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-7281-1206</orcidid><orcidid>https://orcid.org/0000-0002-0896-0458</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2023, Vol.18, p.804-817
issn 1556-6013
1556-6021
language eng
recordid cdi_crossref_primary_10_1109_TIFS_2022_3227445
source IEEE Xplore (Online service)
subjects Artificial neural networks
Auxiliary learning
Computer architecture
deep neural network
Machine learning
Mathematical models
multi-task
Neural networks
Parameters
physical unclonable function
Predictive models
Resists
side-channel attack
Side-channel attacks
Task analysis
title ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T21%3A54%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ALScA:%20A%20Framework%20for%20Using%20Auxiliary%20Learning%20Side-Channel%20Attacks%20to%20Model%20PUFs&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Liu,%20Wei&rft.date=2023&rft.volume=18&rft.spage=804&rft.epage=817&rft.pages=804-817&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2022.3227445&rft_dat=%3Cproquest_cross%3E2758715790%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c245t-4e415200aa2085bb4e586bbeeae68eb6f90018d81ec49c32f7ce844cff123b03%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2758715790&rft_id=info:pmid/&rft_ieee_id=9973338&rfr_iscdi=true