Strengthening PUFs using Composition Zhuanhao Wu, Hiren Patel, Manoj Sachdev and Mahesh V. Tripunitara University of Waterloo Waterloo, Ontario, Canada {zhuanhao.wu,hiren.patel,msachdev,tripunit}@uwaterloo.ca ABSTRACT We explore the idea of composing PUFs with the intent that the resultant PUF is stronger than the constituent PUFs. Prior work has proposed a construction, which subsequent work has shown to be weak. We revisit this prior construction and observe that it is actually weaker than previously thought when the constituent PUFs are arbiter PUFs. This weakness is demonstrated via our adaptation of the previously proposed Logistic Regression (LR) attack. We then propose new constructions called PUFs-composed-with-PUFs (P P ). In particular, we retain a two-layer construction, but allow the same input to the composite PUF to be input to more than one constituent PUF at the first layer. We explore this family of constructions, with arbiter PUFs serving as the constituent PUFs. In particular, we identify several axes which we can vary, and empirically study the resilience of our constructions compared to the prior construction and one another from the standpoint of LR attacks. As insight in to why our family of constructions is stronger, we prove, under some idealized conditions, that the lower-bound on an attacker is indeed higher under our constructions than the upper-bound on an attacker for the prior construction. As such, our work suggests that composition can be a promising approach to strengthening PUFs, contrary to what prior work suggests. CCS CONCEPTS Security and privacy Embedded systems security; Hard- ware attacks and countermeasures. KEYWORDS Physical Unclonable Functions ACM Reference Format: Zhuanhao Wu, Hiren Patel, Manoj Sachdev and Mahesh V. Tripunitara. 2019. Strengthening PUFs using Composition. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/ nnnnnnn.nnnnnnn 1 INTRODUCTION With the advent of Internet-of-Things (IoT) revolution, the number of distributed and unsupervised mobile computing devices contin- ues to increase, and experts believe there will be approximately Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2019 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn 100 billion connected devices by 2020 [16]. For such wide ranging devices, authentication for counterfeit prevention and secure com- munication is an important consideration. Physically Unclonable Functions (PUF)s have recently been proposed as replacements for non-volatile memories and on-die fuses that are prone to physi- cal attacks for storing chip identifying digital signatures and seed generators to other cryptographic functions [9, 17]. PUFs use inher- ent manufacturing process variability to create circuits that appear physically identical at design time, but produce distinct, die-specific responses to input requests (or challenges) following fabrication. Each chip may contain many such challenge response-pairs (CRP)s. PUF architectures can be categorized as strong or weak. The main difference is that a strong PUF must support a large CRP space. Over the years, several strong PUF architectures have been proposed [2]. However, most of these PUFs have also been shown to be susceptible to successful modeling attacks. Through modeling at- tacks, an adversary can mimic the behavior of the strong PUF with a high prediction accuracy (around 95% or higher) rendering them ineffective [1, 14]. An interesting approach proposed in [3] was to compose PUFs such that the resultant PUF offered improved secu- rity, which they called composite PUF (CPUF). The central thesis underlying the approach was that compositions allowed increasing the CRP space while also preserving the performance properties of the resultant PUF. In a later work, the authors themselves identi- fied that the CPUF was also susceptible to a two-phase modeling attack [4] called the cryptanalysis attack (CA-ATK). They showed that CA-ATK, although successful in modeling CPUF, required an enumeration of a large CRP to conduct the attack. In this paper, we start by reviewing CA-ATK, and show that for certain constructions of CPUF, its susceptibility to an attack is much worse than previously considered. Specifically, we propose an enhancement to CA-ATK that uses logistic regression (LR) called LR-CA-ATK to rid the need for the large number of enumerations on constructions of CPUF using arbiter PUFs (ARB-PUFs). Despite this, we contend that PUF compositions can offer an approach for strengthening PUFs even in the presence of the LR-CA-ATK, but, they require careful constructions. In particular, the manner in which the challenges are mapped to inputs of the PUFs can signifi- cantly contribute to the strengthening of the resultant composite PUF. We theoretically show that mapping functions can take a cen- tral role in strengthening the CPUF against the LR-CA-ATK, and also provide supporting empirical validation. 1.1 Contributions We revisit the idea of composing PUFs, each of whose domains is smaller than {0, 1} i , to yield a PUF whose domain is {0, 1} i , and has strength Θ(i ) 1 . When we say “a strength of Θ(i ),” we mean that 1 We use Θ(·) to denote an asymptotic tight bound, and O (·) to denote an asymptotic upper-bound in a manner that is customary in computing[10].