Stochastic selection of responses for physically unclonable functions

P Rojas, H Idriss, S Alahmadi… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Challenges in securing the Internet of Things (IoT) has led to the development of novel
technologies such as physically unclonable functions (PUFs). Having applications in both …

ANN Approach to Predict the Responses of 64 bits XOR APUF with High Accuracy

JJ Khanam, KA Cavicchi - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
Physically unclonable functions (PUFs) are applied in hardware security applications.
During the integrated circuits fabrication process, a unique response mechanism gets …

A dynamically configurable LFSR-based PUF design against machine learning attacks

S Hou, D Deng, Z Wang, J Shi, S Li, Y Guo - CCF Transactions on High …, 2021 - Springer
Physical unclonable function (PUF), a reliable and lightweight physical security primitive for
secret key generation and anti-tampering. Strong PUF is an important PUF classification that …

Machine learning based Modeling Attacks on a Configurable PUF

S Kumar, M Niamat - NAECON 2018-IEEE National Aerospace …, 2018 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are one of the most advanced and secure hardware
based security primitive for system authentication. However, with the introduction of Machine …

POSTER: Attack on non-linear physical unclonable function

J Ye, Y Hu, X Li - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
Physical Unclonable Function (PUF) is a promising hardware security primitive with broad
application prospect. However, the strong PUF with numerous Challenge and Response …

Protecting ring oscillator physical unclonable functions against modeling attacks

SS Mansouri, E Dubrova - International Conference on Information …, 2013 - Springer
One of the most common types of Physical Unclonable Functions (PUFs) is the ring oscillator
PUF (RO-PUF), a type of PUF in which the output bits are obtained by comparing the …

Inconsistency of simulation and practice in delay-based strong PUFs

A Aghaie, A Moradi - IACR Transactions on Cryptographic Hardware …, 2021 - tches.iacr.org
The developments in the areas of strong Physical Unclonable Functions (PUFs) predicate
an ongoing struggle between designers and attackers. Such a combat motivated the …

Building modeling resistant Physically Unclonable Functions (PUFs) using Adversarial Machine Learning

K Prakash - 2024 - escholarship.mcgill.ca
In today's digital age, the proliferation of electronic devices and the rise of Internet of Things
(IoT) have transformed the way we interact with technology. With steady growth in portable …

An efficient reliable PUF-based cryptographic key generator in 65nm CMOS

M Bhargava, K Mai - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are primitives that generate high-entropy, tamper
resistant bits for use in secure systems. For applications such as cryptographic key …

[PDF][PDF] Puffery: An Open-Source Benchmark Tool for PUFs

H Nichols, MR Guthaus - 2019 - woset-workshop.github.io
As concern over security continues to grow within the hardware community, the ability to
openly test and analyze these systems is a necessary requirement. An open-source solution …