Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/93781
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor陳銘憲zh_TW
dc.contributor.advisorMing-Syan Chenen
dc.contributor.author莊于萱zh_TW
dc.contributor.authorYu-Syuan Chuangen
dc.date.accessioned2024-08-08T16:10:29Z-
dc.date.available2024-08-09-
dc.date.copyright2024-08-08-
dc.date.issued2024-
dc.date.submitted2024-08-01-
dc.identifier.citation[1] A. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical One-Way Functions. Science, vol. 297, no. 5589, pp. 2026-2030, 2002.
[2] J. Maes, R. Maes, I. Verbauwhede. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. In: Cryptographic Hardware and Embedded Systems (CHES), 2010.
[3] Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
[4] B. Gassend, D. Clarke, M. van Dijk, S. Devadas. Silicon Physical Random Functions. In: ACM Conference on Computer and Communications Security (CCS),2002.
[5] G. E. Suh, C. W. O’Donnell, I. Lee, and S. Devadas. A Low-Cost Physical Unclonable Function Based on Subthreshold-Voltage Variability. In: Cryptographic Hardware and Embedded Systems (CHES), 2007.
[6] J. Guajardo, S. Kumar, G. Schrijen, and P. Tuyls. FPGA Intrinsic PUFs and Their Use for IP Protection. In: International Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007.
[7] C. Obermaier, C. Beckhoff, and G. Sigl. Secure Key Storage and IP Protection Using Physical Unclonable Functions on FPGA. In: International Conference on Field-Programmable Technology (ICFPT), 2011.
[8] T. van der Leest, J. Plusquellic, and M. van Dijk. Machine Learning Attacks on XOR Arbiter PUFs. In: IEEE Transactions on Information Forensics and Security, vol. 13, no. 12, pp. 3070-3085, 2018.
[9] Y. Liu, C. Zhang, and H. Li. Feature Selection for Machine Learning Attacks on XOR PUFs. In: International Conference on Cryptographic Hardware and Embedded Systems (CHES), 2019.
[10] S. Lee, J. Plusquellic, and M. van Dijk. Adaptive CRP Expansion for Physical Unclonable Functions using Bayesian Optimization. In: IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1017-1032, 2020.
[11] P. Nguyen, A. Rahmati, and L. Carloni. Error-Correcting Codes for Physical Unclonable Functions. In: International Conference on Cryptographic Hardware and Embedded Systems (CHES), 2018.
[12] U. R ̈uhrmair, F. Sehnke, J. S ̈olter, G. Dror, S. Devadas, and J. Schmidhuber. Modeling Attacks on Physical Unclonable Functions. In Proceedings of the 17th ACM conference on Computer and communications security (CCS ’10), Association for Computing Machinery, New York, NY, USA, pp. 237–249, 2010. https://doi.org/10.1145/1866307.1866335
[13] C. Zhou, K. K. Parhi, and C. H. Kim, Secure and Reliable XOR Arbiter PUF Design: An Experimental Study Based on 1 Trillion Challenge Response Pair Measurements, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC), Austin, TX, USA, 2017, pp. 1-6, doi: 10.1145/3061639.3062315.
[14] L. Bolotnyy and G. Robins, Physically Unclonable Function-Based Security and Privacy in RFID Systems, Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2007, pp. 211-220, doi:10.1109/PERCOM.2007.79.
[15] M. Majzoobi, F. Koushanfar, and S. Devadas, Lightweight Secure PUFs, Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, 2008, pp. 670-673, doi: 10.1145/1509456.1509604.
[16] M.-D. Yu and S. Devadas, Secure and Robust Error Correction for Physical Unclonable Functions, IEEE Design & Test of Computers, vol. 27, no. 1, pp.48-65, Jan.-Feb. 2010, doi: 10.1109/MDT.2010.27.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/93781-
dc.description.abstract物理不可克隆函數(PUF)是一種技術,利用硬件製造過程中引入的微小隨機性來生成獨特且無法復制的響應特徵。PUF廣泛應用於硬件安全領域,如身份驗證和密鑰生成。然而,傳統的PUF結構,如XOR PUF,面臨來自機器學習攻擊的風險,這些攻擊可以通過分析挑戰-響應對(CRP)推斷出PUF的內部結構,從而破壞其安全性。
本研究旨在改進XOR PUF結構,提出一種新設計:Selected XOR PUF,以增強其抵抗機器學習攻擊的能力,同時提高CRP的使用效率。通過引入新的設計和算法,我們希望顯著提升PUF的安全性,使其在實際應用中更加可靠和高效。實驗結果表明,改進後的PUF在抵抗機器學習攻擊方面表現出更高的效果,並顯著提高了CRP的使用效率,為未來的PUF應用提供了更強的保障。
此外,我們還開發了另一種設計:Twice Selected XOR PUF,其在抵抗機器學習攻擊方面表現出更顯著的效果。我們還研究了不穩定的CRP空間對PUF的影響,並總結了結論與未來可能的延伸方向。
zh_TW
dc.description.abstractA Physical Unclonable Function (PUF) is a technology that leverages the tiny randomness introduced during the hardware manufacturing process to generate unique and unreplicable response characteristics. PUFs are widely used in the field of hardware security, such as authentication and key generation. However, traditional PUF structures, like XOR PUF, face risks from machine learning attacks, which can infer the internal structure of the PUF by analyzing Challenge-Response Pairs (CRPs), thereby compromising its security.
This study aims to improve the XOR PUF structure by introducing a new design: Selected XOR PUF, to enhance its resistance to machine learning attacks while increasing the efficiency of CRP usage. By incorporating new designs and algorithms, we aim to significantly boost the security of PUFs, making them more reliable and efficient in practical applications. Experimental results show that the improved PUF exhibits higher effectiveness in resisting machine learning attacks and significantly enhances CRP usage efficiency, providing stronger assurance for future PUF applications.
Furthermore, we have developed an additional design: Twice Selected XOR PUF, which demonstrates even more significant resistance to machine learning attacks. We also investigated the impact of unstable CRP Space on PUFs, concluding with potential future directions.
en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2024-08-08T16:10:29Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2024-08-08T16:10:29Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontentsList of Tables iii
List of Figures iv
1 Introduction 1
2 Related Work 4
2.1 Physical Unclonable Function . . . . . . . . . . . . . . . . . . . . . . 4
2.2 Vulnerability of Physical Unclonable Functions to Machine Learning
Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.3 Challenge Response Pair(CRP) Space Decreasing . . . . . . . . . . . 6
3 Preliminary 10
3.1 Mathematical Principles of PUFs . . . . . . . . . . . . . . . . . . . . 10
3.1.1 PUF Formula . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.1.2 PUF Quality Metrics . . . . . . . . . . . . . . . . . . . . . . . 11
3.1.3 XOR PUF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4 Method 13
4.1 Protocol Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.2 PUF Label Decoder and PUF label String Design . . . . . . . . . . . 15
4.3 PUF Side Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.4 CRP space Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.5 Twice selected XOR PUF design . . . . . . . . . . . . . . . . . . . . 17
4.6 Psedocode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5 Experiment 21
5.1 Experimental Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.2 Experiment Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.3 Experiment Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.3.1 Selected PUF Result . . . . . . . . . . . . . . . . . . . . . . . 23
5.3.2 Twice Selected PUF Result . . . . . . . . . . . . . . . . . . . 27
5.3.3 Extending Unstable Percentage Experiment . . . . . . . . . . 30
6 Conclusion 35
Bibliography 36
-
dc.language.isoen-
dc.subjectCRP效率zh_TW
dc.subjectSelected XOR PUFzh_TW
dc.subject不穩定CRP空間zh_TW
dc.subject機器學習攻擊zh_TW
dc.subjectPUFzh_TW
dc.subject物理不可克隆函數zh_TW
dc.subjectXOR PUFzh_TW
dc.subjectCRP Efficiencyen
dc.subjectPUFen
dc.subjectPhysical Unclonable Functionen
dc.subjectMachine Learning Attacken
dc.subjectSelected XOR PUFen
dc.subjectUnstable CRP Spaceen
dc.subjectXOR PUFen
dc.titleSelected XOR PUF: 抵抗機器學習攻擊與擴展挑戰-響應對空間的設計策略zh_TW
dc.titleSelected XOR PUF: Design Strategies for Resisting Machine Learning Attacks and Expanding CRP Spaceen
dc.typeThesis-
dc.date.schoolyear112-2-
dc.description.degree碩士-
dc.contributor.oralexamcommittee楊得年;王凡;陳怡伶zh_TW
dc.contributor.oralexamcommitteeDe-Nian Yang;Farn Wang;Yi-Ling Chenen
dc.subject.keyword物理不可克隆函數,PUF,機器學習攻擊,XOR PUF,Selected XOR PUF,不穩定CRP空間,CRP效率,zh_TW
dc.subject.keywordPUF,Physical Unclonable Function,Machine Learning Attack,Selected XOR PUF,CRP Efficiency,Unstable CRP Space,XOR PUF,en
dc.relation.page38-
dc.identifier.doi10.6342/NTU202402524-
dc.rights.note同意授權(限校園內公開)-
dc.date.accepted2024-08-03-
dc.contributor.author-college電機資訊學院-
dc.contributor.author-dept電機工程學系-
dc.date.embargo-lift2029-07-29-
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-112-2.pdf
  未授權公開取用
807.24 kBAdobe PDF檢視/開啟
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved