• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于忆阻器的物理不可克隆函数抵御机器学习攻击的弹性评估

Resilience evaluation of memristor based PUF against machine learning attacks.

作者信息

Ibrahim Hebatallah M, Skovorodnikov Heorhii, Alkhzaimi Hoda

机构信息

EMARATSEC, New York Univeristy Abu Dhabi, Saadiyat Island, Abu Dhabi, 129188, United Arab Emirates.

出版信息

Sci Rep. 2024 Oct 14;14(1):23962. doi: 10.1038/s41598-024-73839-1.

DOI:10.1038/s41598-024-73839-1
PMID:39397035
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11471811/
Abstract

Physical unclonable functions (PUFs) have emerged as a favorable hardware security primitive, they exploit the process variations to provide unique signatures or secret keys amidst other critical cryptographic applications. CMOS-based PUFs are the most popular type, they generate unique bit strings using process variations in semiconductor fabrication. However, most existing CMOS PUFs are found to be vulnerable to modeling attacks based on machine learning (ML) algorithms. Memristors leveraging nanotechnology fabrication processes and highly nonlinear behavior became an interesting alternative to the existing CMOS-based PUF technology, introducing cryptographic and resilient random outputs. Memristor-based PUFs are emerging due to the inherent randomness at both the memristor level due to the cycle-to-cycle (C2C) programming variation of the device and the fabrication process level such as the cross-sectional area and variations. Our study focuses on building a machine learning analysis and attack framework of tools on memristor-based PUF (MR-PUF). Our objective is to test the resiliency of the security margins of the presented PUF using machine learning analysis tools, on-top of holistic NIST cryptographic randomness testing initially provided, to provide a high level of certainty in predicting the randomness output of the verified Memrister-based PUF. Our main contribution is a holistic study that focuses on attacking the randomness output resiliency based on building randomness predictors using Logistic Regression (LR), Support Vector Machine (SVM), Gaussian Mixture Models (GMM), K-means, K-means , Random Forest, XGBoost and LSTM, within efficient time, and data complexity. Our results yield low accuracy and ROC results of within and respectively, indicating failure in predicting random data demonstrates efficient randomness prediction resiliency of the MR-PUF. The efficient time and data complexities of these attacks illustrated in this study are yielded to be linear and quadratic resulting in attack execution time in seconds and 5032 training samples combined with 2157 testing samples to verify the randomness of PUF.

摘要

物理不可克隆函数(PUF)已成为一种理想的硬件安全原语,在其他关键的加密应用中,它们利用工艺变化来提供唯一签名或密钥。基于CMOS的PUF是最流行的类型,它们利用半导体制造中的工艺变化来生成唯一的比特串。然而,现有的大多数CMOS PUF被发现容易受到基于机器学习(ML)算法的建模攻击。利用纳米技术制造工艺和高度非线性行为的忆阻器成为现有基于CMOS的PUF技术的一个有趣替代方案,可产生加密且具有弹性的随机输出。基于忆阻器的PUF正在兴起,这是由于在忆阻器层面因器件的逐周期(C2C)编程变化以及诸如横截面积和变化等制造工艺层面所固有的随机性。我们的研究重点是构建基于忆阻器的PUF(MR-PUF)的机器学习分析和攻击工具框架。我们的目标是在最初提供的整体NIST加密随机性测试之上,使用机器学习分析工具来测试所提出的PUF安全裕度的弹性,以便在预测经过验证的基于忆阻器的PUF的随机输出时提供高度确定性。我们的主要贡献是一项全面研究,该研究专注于在有效时间和数据复杂度内,基于使用逻辑回归(LR)、支持向量机(SVM)、高斯混合模型(GMM)、K均值、随机森林、XGBoost和长短期记忆网络(LSTM)构建随机预测器来攻击随机输出弹性。我们的结果分别产生了低准确率和ROC结果,分别在[具体数值1]和[具体数值2]以内,表明预测随机数据失败,证明了MR-PUF有效的随机预测弹性。本研究中说明的这些攻击的有效时间和数据复杂度被证明是线性和二次的,导致攻击执行时间以秒为单位,以及5032个训练样本与2157个测试样本相结合来验证PUF的随机性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/a5960d6939fb/41598_2024_73839_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/12545384cacb/41598_2024_73839_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/8d23355adabc/41598_2024_73839_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/4910e39e70e2/41598_2024_73839_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/466e3b9822d0/41598_2024_73839_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/2f62827e4a0c/41598_2024_73839_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/daee66811dfc/41598_2024_73839_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/2afd55847722/41598_2024_73839_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/c42f44e2a341/41598_2024_73839_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/34371b04a47b/41598_2024_73839_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/dccffb9e8f5d/41598_2024_73839_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/00eb362f1e6e/41598_2024_73839_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/0d7b4d9c0501/41598_2024_73839_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/b1f5c362417c/41598_2024_73839_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/8826804d76f1/41598_2024_73839_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/51d5ce3efb37/41598_2024_73839_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/13b725cf67f6/41598_2024_73839_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/a5960d6939fb/41598_2024_73839_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/12545384cacb/41598_2024_73839_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/8d23355adabc/41598_2024_73839_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/4910e39e70e2/41598_2024_73839_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/466e3b9822d0/41598_2024_73839_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/2f62827e4a0c/41598_2024_73839_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/daee66811dfc/41598_2024_73839_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/2afd55847722/41598_2024_73839_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/c42f44e2a341/41598_2024_73839_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/34371b04a47b/41598_2024_73839_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/dccffb9e8f5d/41598_2024_73839_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/00eb362f1e6e/41598_2024_73839_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/0d7b4d9c0501/41598_2024_73839_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/b1f5c362417c/41598_2024_73839_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/8826804d76f1/41598_2024_73839_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/51d5ce3efb37/41598_2024_73839_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/13b725cf67f6/41598_2024_73839_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d2c7/11471811/a5960d6939fb/41598_2024_73839_Fig17_HTML.jpg

相似文献

1
Resilience evaluation of memristor based PUF against machine learning attacks.基于忆阻器的物理不可克隆函数抵御机器学习攻击的弹性评估
Sci Rep. 2024 Oct 14;14(1):23962. doi: 10.1038/s41598-024-73839-1.
2
Memristor-based PUF for lightweight cryptographic randomness.基于忆阻器的轻量级密码随机数生成物理不可克隆函数
Sci Rep. 2022 May 23;12(1):8633. doi: 10.1038/s41598-022-11240-6.
3
Memristive crypto primitive for building highly secure physical unclonable functions.用于构建高度安全的物理不可克隆功能的忆阻密码原语。
Sci Rep. 2015 Aug 4;5:12785. doi: 10.1038/srep12785.
4
Physical unclonable function using photonic spin Hall effect.利用光子自旋霍尔效应的物理不可克隆函数
Sci Rep. 2024 Jun 22;14(1):14393. doi: 10.1038/s41598-024-65176-0.
5
Four-Dimensional Physical Unclonable Functions and Cryptographic Applications Based on Time-Varying Chaotic Phosphorescent Patterns.基于时变混沌磷光模式的四维物理不可克隆函数及密码学应用
ACS Nano. 2024 May 7;18(18):11703-11716. doi: 10.1021/acsnano.3c12432. Epub 2024 Apr 23.
6
Halide perovskite memristors as flexible and reconfigurable physical unclonable functions.卤化物钙钛矿忆阻器作为灵活且可重构的物理不可克隆功能器件。
Nat Commun. 2021 Jun 17;12(1):3681. doi: 10.1038/s41467-021-24057-0.
7
Hardware-Intrinsic Physical Unclonable Functions by Harnessing Nonlinear Conductance Variation in Oxide Semiconductor-Based Diode.通过利用基于氧化物半导体的二极管中的非线性电导变化实现的硬件固有物理不可克隆功能
Nanomaterials (Basel). 2023 Feb 9;13(4):675. doi: 10.3390/nano13040675.
8
Highly Secure Physically Unclonable Cryptographic Primitives Based on Interfacial Magnetic Anisotropy.基于界面磁各向异性的高安全性物理不可克隆密码原语。
Nano Lett. 2018 Nov 14;18(11):7211-7216. doi: 10.1021/acs.nanolett.8b03338. Epub 2018 Oct 29.
9
Disordered Mixture of Self-Assembled Molecular Functional Groups on Heterointerfaces with p-Si Leads to Multiple Key Generation in Physical Unclonable Functions.异质界面上自组装分子功能基团的紊乱混合导致物理不可克隆函数中的多个关键生成。
ACS Appl Mater Interfaces. 2023 Jan 11;15(1):1693-1703. doi: 10.1021/acsami.2c18740. Epub 2022 Dec 13.
10
A New Arbiter PUF for Enhancing Unpredictability on FPGA.一种用于增强FPGA不可预测性的新型仲裁器PUF
ScientificWorldJournal. 2015;2015:864812. doi: 10.1155/2015/864812. Epub 2015 Sep 30.

引用本文的文献

1
Light in, sound keys out: photoacoustic PUFs from stochastic nanocomposites.光入,声键出:基于随机纳米复合材料的光声物理不可克隆函数
Nat Commun. 2025 Aug 8;16(1):7323. doi: 10.1038/s41467-025-62747-1.
2
Building a Risk Scoring Model for ARDS in Lung Adenocarcinoma Patients Using Machine Learning Algorithms.使用机器学习算法构建肺腺癌患者急性呼吸窘迫综合征的风险评分模型
J Cell Mol Med. 2024 Dec;28(23):e70280. doi: 10.1111/jcmm.70280.

本文引用的文献

1
Memristor-based PUF for lightweight cryptographic randomness.基于忆阻器的轻量级密码随机数生成物理不可克隆函数
Sci Rep. 2022 May 23;12(1):8633. doi: 10.1038/s41598-022-11240-6.
2
Evolution of the conductive filament system in HfO-based memristors observed by direct atomic-scale imaging.通过直接原子尺度成像观察到的基于HfO的忆阻器中传导细丝系统的演变。
Nat Commun. 2021 Dec 13;12(1):7232. doi: 10.1038/s41467-021-27575-z.
3
Long short-term memory.长短期记忆
Neural Comput. 1997 Nov 15;9(8):1735-80. doi: 10.1162/neco.1997.9.8.1735.