TY - JOUR
T1 - Resilience evaluation of memristor based PUF against machine learning attacks
AU - Ibrahim, Hebatallah M.
AU - Skovorodnikov, Heorhii
AU - Alkhzaimi, Hoda
N1 - Publisher Copyright:
© The Author(s) 2024.
PY - 2024/12
Y1 - 2024/12
N2 - Physical unclonable functions (PUFs) have emerged as a favorable hardware security primitive, they exploit the process variations to provide unique signatures or secret keys amidst other critical cryptographic applications. CMOS-based PUFs are the most popular type, they generate unique bit strings using process variations in semiconductor fabrication. However, most existing CMOS PUFs are found to be vulnerable to modeling attacks based on machine learning (ML) algorithms. Memristors leveraging nanotechnology fabrication processes and highly nonlinear behavior became an interesting alternative to the existing CMOS-based PUF technology, introducing cryptographic and resilient random outputs. Memristor-based PUFs are emerging due to the inherent randomness at both the memristor level due to the cycle-to-cycle (C2C) programming variation of the device and the fabrication process level such as the cross-sectional area and variations. Our study focuses on building a machine learning analysis and attack framework of tools on Cu/HfO2-x/p++Si memristor-based PUF (MR-PUF). Our objective is to test the resiliency of the security margins of the presented PUF using machine learning analysis tools, on-top of holistic NIST cryptographic randomness testing initially provided, to provide a high level of certainty in predicting the randomness output of the verified Memrister-based PUF. Our main contribution is a holistic study that focuses on attacking the randomness output resiliency based on building randomness predictors using Logistic Regression (LR), Support Vector Machine (SVM), Gaussian Mixture Models (GMM), K-means, K-means++, Random Forest, XGBoost and LSTM, within efficient time, and data complexity. Our results yield low accuracy and ROC results of within 0.49-0.52 and 0.49-0.52 respectively, indicating failure in predicting random data demonstrates efficient randomness prediction resiliency of the MR-PUF. The efficient time and data complexities of these attacks illustrated in this study are yielded to be linear and quadratic resulting in attack execution time in seconds and 5032 training samples combined with 2157 testing samples to verify the randomness of PUF.
AB - Physical unclonable functions (PUFs) have emerged as a favorable hardware security primitive, they exploit the process variations to provide unique signatures or secret keys amidst other critical cryptographic applications. CMOS-based PUFs are the most popular type, they generate unique bit strings using process variations in semiconductor fabrication. However, most existing CMOS PUFs are found to be vulnerable to modeling attacks based on machine learning (ML) algorithms. Memristors leveraging nanotechnology fabrication processes and highly nonlinear behavior became an interesting alternative to the existing CMOS-based PUF technology, introducing cryptographic and resilient random outputs. Memristor-based PUFs are emerging due to the inherent randomness at both the memristor level due to the cycle-to-cycle (C2C) programming variation of the device and the fabrication process level such as the cross-sectional area and variations. Our study focuses on building a machine learning analysis and attack framework of tools on Cu/HfO2-x/p++Si memristor-based PUF (MR-PUF). Our objective is to test the resiliency of the security margins of the presented PUF using machine learning analysis tools, on-top of holistic NIST cryptographic randomness testing initially provided, to provide a high level of certainty in predicting the randomness output of the verified Memrister-based PUF. Our main contribution is a holistic study that focuses on attacking the randomness output resiliency based on building randomness predictors using Logistic Regression (LR), Support Vector Machine (SVM), Gaussian Mixture Models (GMM), K-means, K-means++, Random Forest, XGBoost and LSTM, within efficient time, and data complexity. Our results yield low accuracy and ROC results of within 0.49-0.52 and 0.49-0.52 respectively, indicating failure in predicting random data demonstrates efficient randomness prediction resiliency of the MR-PUF. The efficient time and data complexities of these attacks illustrated in this study are yielded to be linear and quadratic resulting in attack execution time in seconds and 5032 training samples combined with 2157 testing samples to verify the randomness of PUF.
KW - Machine learning analysis
KW - Memristor
KW - Modeling attacks
KW - Physical unclonable functions
UR - http://www.scopus.com/inward/record.url?scp=85206279416&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85206279416&partnerID=8YFLogxK
U2 - 10.1038/s41598-024-73839-1
DO - 10.1038/s41598-024-73839-1
M3 - Article
C2 - 39397035
AN - SCOPUS:85206279416
SN - 2045-2322
VL - 14
JO - Scientific reports
JF - Scientific reports
IS - 1
M1 - 23962
ER -