20 research outputs found

    PAC Learnability of iPUF Variants

    Get PDF
    Interpose PUF~(iPUF) is a strong PUF construction that was shown to be vulnerable against empirical machine learning as well as PAC learning attacks. In this work, we extend the PAC Learning results of Interpose PUF to prove that the variants of iPUF are also learnable in the PAC model under the Linear Threshold Function representation class

    Interpose PUF can be PAC Learned

    Get PDF
    In this work, we prove that Interpose PUF is learnable in the PAC model. First, we show that Interpose PUF can be approximated by a Linear Threshold Function~(LTF), assuming the interpose bit to be random. We translate the randomness in the interpose bit to classification noise of the hypothesis. Using classification noise model, we prove that the resultant LTF can be learned with number of labelled examples~(challenge response pairs) polynomial in the number of stages and PAC model parameters

    Learnability of Multiplexer PUF and SNS_N-PUF : A Fourier-based Approach

    Get PDF
    In this work, we prove that Multiplexer PUF~(MPUF) and SNS_N-PUF are learnable in the PAC model. First, we show that both the designs can be represented as a function of Linear Threshold Functions. We show that the noise sensitivity of (n,k)(n,k)-MPUF and SNS_N-PUF can be bounded by O(2kϵ)O(2^{k} \sqrt{\epsilon}) and O(Nϵ)O(N\sqrt{\epsilon}) respectively. Finally, we show that as a result of bounded noise sensitivity, both the designs can be accurately approximated using low degree algorithm. Also, the number of labelled examples~(challenge-response pairs) required by the algorithm is polynomial in the input length and PAC model parameters

    Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs

    Get PDF
    Physically Unclonable Functions~(PUFs) with large challenge space~(also called Strong PUFs) are promoted for usage in authentications and various other cryptographic and security applications. In order to qualify for these cryptographic applications, the Boolean functions realized by PUFs need to possess a high non-linearity~(NL). However, with a large challenge space~(usually ≥64\geq 64 bits), measuring NL by classical techniques like Walsh transformation is computationally infeasible. In this paper, we propose the usage of a heuristic-based measure called non-homomorphicity test which estimates the NL of Boolean functions with high accuracy in spite of not needing access to the entire challenge-response set. We also combine our analysis with a technique used in linear cryptanalysis, called Piling-up lemma, to measure the NL of popular PUF compositions. As a demonstration to justify the soundness of the metric, we perform extensive experimentation by first estimating the NL of constituent Arbiter/Bistable Ring PUFs using the non-homomorphicity test, and then applying them to quantify the same for their XOR compositions namely XOR Arbiter PUFs and XOR Bistable Ring PUF. Our findings show that the metric explains the impact of various parameter choices of these PUF compositions on the NL obtained and thus promises to be used as an important objective criterion for future efforts to evaluate PUF designs. While the framework is not representative of the machine learning robustness of PUFs, it can be a useful complementary tool to analyze the cryptanalytic strengths of PUF primitives

    Physically Related Functions: A New Paradigm for Light-weight Key-Exchange

    Get PDF
    In this paper, we propose a novel concept named Physically Related Function(PReF) which are devices with hardware roots of trust. It enables secure key-exchange with no pre-established/embedded secret keys. This work is motivated by the need to perform key-exchange between lightweight resource-constrained devices. We present a proof-of-concept realization of our contributions in hardware using FPGAs

    Reliability annotations to formal specifications of context-sensitive safety properties in embedded systems

    No full text
    As the aspect of reliability is becoming increasingly important in the context of safety-critical embedded systems, developing formalism for specifying the reliability requirements for such systems has become very relevant. We present a formalism for modeling the reliability requirement succinctly for safety-critical embedded systems and propose the semantics over the task schedule of the embedded systems controller. We introduce the notion of reliability deficiency to represent the difference between the specified and the actual value of the reliability achieved by a schedule and present techniques to make up the reliability deficiency. The presented approach is primarily applicable to specify the reliability requirements of context-sensitive tasks executed by a real-time software system so that they can overcome transient failures using temporal redundancy, i.e., repetitive execution of the same task. We illustrate our formalism and the proposed techniques using suitable scenarios from the automotive domain

    Reliability guarantees in automata-based scheduling for embedded control software

    No full text
    Automata-based scheduling is a recent technique for online scheduling of software control components in embedded systems. This letter studies one important aspect of automata-based scheduling that has not been studied in the past, namely resilience to faults. The goal of the proposed technique is to create an automaton that recommends the scheduling patterns that are admissible with respect to control performance requirements, when the state of the system has been mutated by faults. The problem has been formulated as a game between the scheduler and the (possibly faulty) system, where a winning strategy of the scheduler prevents the system from reaching bad states forever. We present a method for analyzing the structure of the game and extracting an automaton that captures the winning strategies of the scheduler, namely the automaton to be used for automata-based scheduling

    Inline assertions - embedding formal properties in a test bench

    No full text
    The scope of immediate assertions in SystemVerilog is restricted to Boolean properties, where as temporal properties are specified as concurrent assertions. Concurrent assertion statements can also be embedded in a procedural block - known as procedural concurrent assertions which are used under restricted situations. This paper introduces the notion of inline assertions which generalizes the embedding of temporal properties within the procedural code of a test bench. The paper proposes verification methodologies for inline assertions and compares them with the traditional approaches of formal property verification and dynamic assertion based verification. The paper also focuses on coverage related issues when the intent of a concurrent assertion is modeled as an inline assertion
    corecore