The present invention relates to systems for security and, more specifically, to control of open access system security through limiting challenge/response attacks based on machine learning attacks.
The invention relates to limiting “oracle access” to the challenge/response characteristics of a physical function, to help prevent mathematical attacks such as machine learning attacks. These attacks take advantage of a practically unbounded access of challenge/response pairs to a physical device containing a physical function, to train a mathematical model that mimic the input/output characteristics of a physical function in a mathematical cloning attack.
Physical functions, such as certain Arbiter PUF configurations, can be modeled using machine learning algorithms by obtaining a sufficient number of challenge/response pairs; once the challenge/response pairs are obtained, the attack can occur off-line. It is, therefore, desirable, to limit the amount of challenge/response information that can be used by such an attacker. In “key generation” applications where error correction is applied to remove the PUF noise, only a fixed number of challenges and a fixed number of responses need to be used. The maximum amount of challenge/response information that can possibly be made available to an adversary is bounded because the keying bits generated are bounded.
To date, in authentication applications, where no error correction is applied, there is no published way to limit the number of challenge/response pairs available to an adversary. Therefore, what is needed is a system and method for limiting the number of challenge/response pairs available to an adversary or false device.
The present invention provides a system and methods for limiting the number of challenge/response pairs available to an adversary. In accordance with the various aspects of the present invention “Gate” the access to an “Authentication PUF” with a “Gatekeeper PUF.” Therefore, the system can create a challenge/response protocol whereby amount of challenge/response information leaked can be fully controlled by the server from a mathematical and protocol standpoint, and the device cannot arbitrary leak an arbitrary large number of challenge/response pairs when the device is in the possession of or being queried by an adversary or false device.
The drawings are intended to be illustrative, to those of skill in the art, of particular aspects of the invention and are not necessarily to scale and each is not necessarily inclusive of all aspects.
The invention can be realized in a wide variety of ways. The figures and description disclosed herein are illustrative of only a small range of possible embodiments of the invention.
As will be apparent to those of skill in the art upon reading this disclosure, each of the aspects described and illustrated herein has discrete components and features which may be readily separated from or combined with the features and aspects to form embodiments, without departing from the scope or spirit of the invention. Any recited method can be carried out in the order of events recited or in any other order which is logically possible.
In accordance with the various aspects and teachings of the present invention a computer and a computing device are articles of manufacture. Other examples of an article of manufacture include: an electronic component residing on a mother board, circuits, a server, a mainframe computer, or other special purpose computer components, each having one or more processors (e.g., a Central Processing Unit, a Graphical Processing Unit, a circuit, or a microprocessor) that is configured to execute code (e.g., an algorithm, hardware, firmware, and/or software) to derive data, receive data, transmit data, store data, or perform methods and steps. The article of manufacture (e.g., computer, circuit, or computing device) includes a non-transitory computer readable medium or storage that may include a series of instructions, such as computer readable program steps or code encoded therein. In certain aspects of the invention, the non-transitory computer readable medium includes one or more data repositories. Thus, in certain embodiments that are in accordance with any aspect of the invention, computer readable program code (or code) is encoded in a non-transitory computer readable medium of the computing device. The processor, in turn, executes the computer readable program code to create or amend an existing computer-aided design using a tool. In other aspects of the embodiments, the creation or amendment of the computer-aided design is implemented as a web-based software application in which portions of the data related to the computer-aided design or the tool or the computer readable program code are received or transmitted to a computing device or a host, such as a server and associated database.
Therefore, an article of manufacture or system, in accordance with various aspects of the invention, is implemented in a variety of ways: with one or more distinct processors or microprocessors, volatile and/or non-volatile memory and peripherals or peripheral controllers; with an integrated microcontroller, which has a processor, local volatile and non-volatile memory, peripherals and input/output pins; discrete logic which implements a fixed version of the article of manufacture or system; and programmable logic which implements a version of the article of manufacture or system which can be reprogrammed either through a local or remote interface. Such logic could implement a control system either in logic or via a set of commands executed by a circuit or a processor.
Referring now to
Referring now to
Referring to
Referring now to
Referring now to
Referring to
Referring now to
R
gk1=PUFgk(C1),
R
auth1=PUFauth(C1),
and the triplet {C1, Rgk1, Rauth1} is stored, at step 214 in the database 16 as {C1, R1}. At step 216, if other challenges/responses are needed, then process is repeated by returning to step 210; otherwise the process ends at step 218. The provisioning extraction feature is then disabled, e.g., via a fuse, presence of certain non-volatile initialization parameters, use of one-way functions ,etc.
Referring now to
Referring now to
In accordance with some aspects and embodiments of the present invention, a separate Gatekeeper and PUF circuit are shown for clarity. In accordance with one aspect of the present invention, the two may be merged by a creative choice of a challenge schedule. In accordance with the various aspects of the present invention, the challenges of the two modules to be interlocked in a manner that prevents chaining or other related attacks. Further, by using offline authentication modality, challenge/response pairs need not to be explicitly stored. Further, the provisioning server and local authentication server need not to be the same entity.
In accordance with some aspects and embodiments, a partial database can be generated by the provisioning a server to different authentication parties to allow each of them, who may not trust each other, to perform independent cross-audit functions of the authentication. The partial database can be derived from explicit challenge/response pairs collected, or can be synthesized from PUF parameters corresponding to the offline authentication method. The method is not limited to an Arbiter PUF but to almost any PUF having challenge/response characteristics, including Ring Oscillator constructions, and non-silicon physical functions that has a challenge/response evaluation mechanism in general.
In accordance with some aspects and embodiments, the gating function and the gatekeeper are at the device level, either as Simple Gating PUF mechanism or in combination with a Double Gating primitive. If a PUF authentication primitive is integrated in a device, such as device 22, be it a mobile device such as a smart phone or any system with some basic logic and a PUF authentication mechanism, and the process on the device is gated by the result of the authentication; then the process for the protocol is the following: the device starts process A that requires a PUF authentication; the device queries the PUF authentication mechanism before starting the process; IF the PUF authentication is validated, the process is started and IF NOT, the process is aborted. In accordance with some aspects and embodiments, the PUF authentication mechanism could be embedded in the device itself. In accordance with some other aspects and embodiments the PUF authentication mechanism is implemented in a separate device (such as a token) that can communicate with the primary device. Thus, unless the gate is open or enabled (i.e. the authentication is successful) the process making the query will not release any information and abort, thereby preventing attack from an adversary or false device.
In accordance with some aspects and embodiments, the GateKeeper+PUF circuit are defined as a full hardware solution. In accordance with some aspects and embodiments, use the PUF Circuit as a gating component as a combination of hardware and software to build a hybrid solution. Thus, it will apparent to one skilled in the art that the scope of the present invention is not limited by the hardware or software solutions and in accordance with the aspects and embodiments of the present invention, the system can define GateKeeper +PUF circuit as a PUF Gating or gatekeeper component/module, wherein the components are separate or merged.
In accordance with some aspects and embodiments, the gating function is to put the control at the server level. In this case, the use of the PUF circuit as a gating function is to prevent the execution of a transaction and provide a process for the release of any information, based on the authentication status after a query.
Referring now to
In accordance with some aspects and embodiments, the use of a gating function at the Server level is two-fold: (1) a sub-system of the PUF circuit+GateKeeper as described locally implemented as a hardware module and as part of the server architecture; and/or (2) the PUF circuit+GateKeeper could be implemented at the Device level and the authentication performed with another (authentication) server, the result (or response) being forwarded as a signed response (classical delegation mechanism) to the Server controlling the gating function/mechanism with the Third Party service.
As will be apparent to those of skill in the art upon reading this disclosure, each of the individual embodiments described and illustrated herein has discrete components and features which may be readily separated from or combined with the features of any of the other several embodiments without departing from the scope or spirit of the present invention. Any recited method can be carried out in the order of events recited or in any other order which is logically possible. Although the foregoing invention has been described in some detail by way of illustration and example for purposes of clarity of understanding, it is readily apparent to those of ordinary skill in the art in light of the teachings of this invention that certain changes and modifications may be made thereto without departing from the spirit or scope of the appended claims.
It is noted that, as used herein and in the appended claims, the singular forms “a”, “an”, and “the” include plural referents unless the context clearly dictates otherwise. It is further noted that the claims may be drafted to exclude any optional element. As such, this statement is intended to serve as antecedent basis for use of such exclusive terminology as “solely,” “only” and the like in connection with the recitation of claim elements, or use of a “negative” limitation.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Although any methods and materials similar or equivalent to those described herein can also be used in the practice or testing of the present invention, representative illustrative methods and materials are now described.
All publications and patents cited in this specification are herein incorporated by reference as if each individual publication or patent were specifically and individually indicated to be incorporated by reference and are incorporated herein by reference to disclose and describe the methods and/or materials in connection with which the publications are cited. The citation of any publication is for its disclosure prior to the filing date and should not be construed as an admission that the present invention is not entitled to antedate such publication by virtue of prior invention. Further, the dates of publication provided may be different from the actual publication dates which may need to be independently confirmed.
Accordingly, the preceding merely illustrates the principles of the invention. It will be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown herein, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples and conditional language recited herein are principally intended to aid the reader in understanding the principles of the invention and the concepts contributed by the inventors to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents and equivalents developed in the future, i.e., any elements developed that perform the same function, regardless of structure. The scope of the present invention, therefore, is not intended to be limited to the exemplary embodiments shown and described herein. Rather, the scope and spirit of present invention is embodied by the appended claims.
Pursuant to 35 U.S.C. §119 (e), this application claims priority to the filing date of U.S. Provisional Patent Application Ser. No. 61/817,875 filed on May 1, 2013 (Titled ACCESS GATING OF NOISY PHYSICAL FUNCTIONS), the entire disclosures of which application is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61817875 | May 2013 | US |