ダウンロード数: 195
このアイテムのファイル:
ファイル | 記述 | サイズ | フォーマット | |
---|---|---|---|---|
transfun.E101.A.1035.pdf | 7.33 MB | Adobe PDF | 見る/開く |
タイトル: | MRO-PUF: Physically Unclonable Function With Enhanced Resistance Against Machine Learning Attacks Utilizing Instantaneous Output of Ring Oscillator |
著者: | HIROMOTO, Masayuki YOSHINAGA, Motoki SATO, Takashi https://orcid.org/0000-0002-1577-8259 (unconfirmed) |
著者名の別形: | 廣本, 正之 佐藤, 高史 |
キーワード: | physically unclonable function (PUF) chip identification machine learning attacks ring oscillator |
発行日: | 1-Jul-2018 |
出版者: | 電子情報通信学会 |
誌名: | IEICE Transactions of Fundamentals on Electronics, Communications and Computer Sciences |
巻: | E101-A |
号: | 7 |
開始ページ: | 1035 |
終了ページ: | 1044 |
抄録: | This paper proposes MRO-PUF, a new architecture for ring-oscillator-based physically unclonable functions (PUFs) with enhanced resistance against machine learning attacks. In the proposed PUF, an instantaneous output value of a ring oscillator is used as a response, whereas the most existing PUFs directly use propagation delays to determine the response. Since the response of the MRO-PUF is non-linear and discontinuous as the delay of the ring oscillator increases, the prediction of the response by machine learning attacks is difficult. Through the performance evaluation of the MRO-PUF with simulations, it achieves 15 times stronger resistance against machine learning attacks using a support vector machine compared to the existing ones such as an arbiter PUF and a bistable ring PUF. The MRO-PUF also achieves a sufficient level of the basic performance of PUFs in terms of uniqueness and robustness. |
著作権等: | © 2018 The Institute of Electronics, Information and Communication Engineers 許諾条件に基づいて掲載しています。 |
URI: | http://hdl.handle.net/2433/242228 |
DOI(出版社版): | 10.1587/transfun.E101.A.1035 |
関連リンク: | https://www.ieice.org/jpn/books/transaction.html |
出現コレクション: | 学術雑誌掲載論文等 |
このリポジトリに保管されているアイテムはすべて著作権により保護されています。