• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2025, Vol. 47 ›› Issue (9): 1586-1597.

• Computer Network and Znformation Security • Previous Articles     Next Articles

Is adversarial-arbiter physical unclonable function really secure

JIANG Haolin1,2,3,DENG Ding1,2,3,NI Shaojie1,2,LOU Shengqiang1,2,3,SUN Pengyue1,2,3,ZHANG Shuzheng1,2,3   

  1. (1.College of Electronic Science and Technology,National University of Defense Technology,Changsha 410073;
    2.National Key Laboratory for Positioning,Navigation and Timing Technology,Changsha 410073;
    3.Center for Cryptologic Research,National University of Defense Technology,Changsha 410073,China)

  • Received:2023-12-13 Revised:2024-06-24 Online:2025-09-25 Published:2025-09-22

Abstract: Physically unclonable function (PUF) is a promising security primitive for authentication security.Proposing attack models tailored to different PUFs can drive their design improvement and enhance security.Adversarial-arbiter PUF (A-APUF) is a secure PUF proposed in 2021,claiming to effectively resist modeling attacks.This paper focuses on the A-APUF and proposes a bidirectional- challenge-based attack model.Firstly,bidirectional challenge sequences are applied to the A-APUF to obtain bidirectional response sequence,and then the control sequence is calculated.Secondly,the XOR tap coefficients are calculated using the control sequence.Finally,the XOR tap coefficients are used to crack the A-APUF into an arbiter PUF (APUF).The experiments show that this model effectively reduces attack difficulty for both standard and upgraded defense mechanisms of A-APUF,bringing it to the level of an ordinary APUF.Using a conventional feedforward neural network achieves over 90% accuracy with just 1 000 challenge-response  pairs for A-APUF.

Key words: physically unclonable function (PUF), obfuscation, bidirectional challenge sequence, modeling attack