A PUF-Based Approach for Copy Protection of Intellectual Property in Neural Network Models
Daniel Dorfmeister , Flavio Ferrarotti , Bernhard Fischer , Martin Schwandtner , Hannes Sochor
Published on arXiv
2603.10753
Model Theft
OWASP ML Top 10 — ML05
Key Finding
Binding NN weights to hardware PUF responses causes sufficient accuracy degradation on cloned hardware to render the stolen model operationally useless.
PUF-based NN Weight Binding
Novel technique introduced
More and more companies' Intellectual Property (IP) is being integrated into Neural Network (NN) models. This IP has considerable value for companies and, therefore, requires adequate protection. For example, an attacker might replicate a production machines' hardware and subsequently simply copy associated software and NN models onto the cloned hardware. To make copying NN models onto cloned hardware infeasible, we present an approach to bind NN models - and thus also the IP contained within them - to their underlying hardware. For this purpose, we link an NN model's weights, which are crucial for its operation, to unique and unclonable hardware properties by leveraging Physically Unclonable Functions (PUFs). By doing so, sufficient accuracy can only be achieved using the target hardware to restore the original weights, rendering proper execution of the NN model on cloned hardware impossible. We demonstrate that our approach accomplishes the desired degradation of accuracy on various NN models and outline possible future improvements.
Key Contributions
- PUF-based hardware-software binding technique that links NN model weights to unique, unclonable physical hardware properties
- Copy protection scheme that degrades model accuracy on unauthorized (cloned) hardware while preserving accuracy on target hardware
- Evaluation across multiple NN model architectures demonstrating effectiveness of the accuracy-degradation approach
🛡️ Threat Analysis
The paper directly defends against model theft — an attacker clones hardware and copies NN models. The PUF-based weight-binding scheme ensures stolen model copies are rendered inaccurate on unauthorized hardware, protecting model IP. This is a model ownership/copy-protection defense, the defining use case of ML05.