Next Article in Journal
Attention Collaborative Autoencoder for Explicit Recommender Systems
Next Article in Special Issue
Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative Analysis
Previous Article in Journal
Improving Deep Learning-Based UWB LOS/NLOS Identification with Transfer Learning: An Empirical Approach
Previous Article in Special Issue
From Conventional to State-of-the-Art IoT Access Control Models
Open AccessArticle

A Fast Deep Learning Method for Security Vulnerability Study of XOR PUFs

1
Department of Computer Science, Texas Tech University, Lubbock, TX 79409, USA
2
College of Computer Science and Engineering, University of Jeddah, Jeddah 21959, Saudi Arabia
3
Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(10), 1715; https://doi.org/10.3390/electronics9101715
Received: 22 September 2020 / Revised: 14 October 2020 / Accepted: 14 October 2020 / Published: 18 October 2020
(This article belongs to the Special Issue Cyber Security for Internet of Things)
Physical unclonable functions (PUF) are emerging as a promising alternative to traditional cryptographic protocols for IoT authentication. XOR Arbiter PUFs (XPUFs), a group of well-studied PUFs, are found to be secure against machine learning (ML) attacks if the XOR gate is large enough, as both the number of CRPs and the computational time required for modeling n-XPUF increases fast with respect to n, the number of component arbiter PUFs. In this paper, we present a neural network-based method that can successfully attack XPUFs with significantly fewer CRPs and shorter learning time when compared with existing ML attack methods. Specifically, the experimental study in this paper shows that our new method can break the 64-bit 9-XPUF within ten minutes of learning time for all of the tested samples and runs, with magnitudes faster than the fastest existing ML attack method, which takes over 1.5 days of parallel computing time on 16 cores. View Full-Text
Keywords: resource-constrained IoT; IoT security; XOR PUF; FPGA; machine-learning resource-constrained IoT; IoT security; XOR PUF; FPGA; machine-learning
Show Figures

Figure 1

MDPI and ACS Style

Mursi, K.T.; Thapaliya, B.; Zhuang, Y.; Aseeri, A.O.; Alkatheiri, M.S. A Fast Deep Learning Method for Security Vulnerability Study of XOR PUFs. Electronics 2020, 9, 1715.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop