期刊文献+

基于MLP算法的Glitch PUF机器学习攻击 被引量:1

Machine learning attack to Glitch PUF based on MLP algorithm
下载PDF
导出
摘要 随着攻击技术的不断进步,基于机器学习(Machine Learning,ML)、深度学习(Deep Learning,DL)等技术的建模攻击严重威胁了PUF的安全。针对Glitch PUF单元电路静态输出的缺陷,首次提出使用多层感知器(Multilayer Perceptron,MLP)算法对Glitch PUF进行机器学习,解决了Glitch PUF输出为非线性可分数据的问题,能够对Glitch PUF攻击并预测其输出。实验表明,对比于逻辑回归(Logistic Regression,LR)算法和随机森林(Random Forest,RF)二分类算法,提出的MLP算法显著降低了预测错误率。 With the development of attack technology,modeling attacks based on ML,DL and other technologies threaten the security of PUF seriously.In view of the flaw in Glitch PUF static output,this paper first proposes the multilayer perceptron algorithm for Glitch PUF machine learning to analysis nonlinear output data.The experimental results show that the MLP algorithm proposed in this paper can significantly reduce the prediction error rate compared with the logistic regression algorithm and the random forest classification algorithm.
作者 徐金甫 董永兴 李军伟 Xu Jinfu;Dong Yongxing;Li Junwei(The PLA Information Engineering University,Zhengzhou 450001,China)
出处 《电子技术应用》 2019年第12期62-66,共5页 Application of Electronic Technique
关键词 信息安全 Glitch PUF 机器学习 建模攻击 information security Glitch PUF machine learning modeling attack
  • 相关文献

参考文献5

二级参考文献58

  • 1闫友彪,陈元琰.机器学习的主要策略综述[J].计算机应用研究,2004,21(7):4-10. 被引量:57
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3GASSEND B, CLARKE D, VANDIJK M, et al. Delay-based circuit authentication and applications[ C]// ACM Symposium on Applied Computing. New York: ACM, 2003:294 - 301.
  • 4PAPPU R S. Physical one-way functions[ D]. Boston: Massachusetts Institute of Technology, 2001.
  • 5LIM D, Extracting secret keys from integrated circuits[ D]. Boston: Massachusetts Institute of Technology, 2004.
  • 6LEE JW, LIM D, GASSEND B, et al. A technique to build a secret key in integrated circuits for identification and authentication application[ C] // Proceedings of the Symposium on VLSI Circuits. Washington, DC: IEEE Computer Society, 2004:176 - 159.
  • 7KUMAR S, GUAJARDO J, MAES R, et al. The butterfly PUF protecting IP on every FPGA[ C]//IEEE International Workshop on Hardware-oriented Security and Trust. Washington, DC: IEEE Computer Society, 2008 : 67 - 70.
  • 8OZTURK E, HAMMOURI G, SUNAR B. Towards robust low cost authentication for pervasive devices [ C ]// Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communication. Washington, DC: IEEE Computer Society, 2008:170 - 178.
  • 9SADEGHI A R, SCHULZ S, WACHSMANN C. Lightweight remote attestation using physical function[ C]// Conference on Wireless Network Security. New York: ACM, 2011 : 109 - 114.
  • 10TUYLS P. BATINA L. RFID-tags for anti-conterferting[ C]//Topics in Cryptology,2006, LNCS 3860. Bedim Springer, 2006:13 - 17.

共引文献69

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部