Neural network modeling attacks on arbiter-PUF-based designs

N Wisiol, B Thapaliya, KT Mursi… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
By revisiting, improving, and extending recent neural-network based modeling attacks on
XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs,(XOR) Feed-Forward …

Tunable nonlinear optical map** in a multiple-scattering cavity

Y Eliezer, U Rührmair, N Wisiol… - Proceedings of the …, 2023 - National Acad Sciences
Nonlinear disordered systems are not only a model system for fundamental studies but also
in high demand for practical applications. However, optical nonlinearity based on intrinsic …

Transfer-path-based hardware-reuse strong PUF achieving modeling attack resilience with200 million training CRPs

C Xu, J Zhang, MK Law, X Zhao, PI Mak… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper presents a hardware-reuse strong physical unclonable function (PUF) based on
the intrinsic transfer paths (TPs) of a conventional digital multiplier to achieve a strong …

Attacking Delay-based PUFs with Minimal Adversarial Knowledge

F Hongming, O Millwood, P Gope… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) provide a streamlined solution for lightweight
device authentication. Delay-based Arbiter PUFs, with their ease of implementation and vast …

Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function

J Dofe, S Rajput - Cluster Computing, 2025 - Springer
The rapid integration of IoT devices has ushered in unparalleled convenience and
efficiency. However, ensuring secure communication and authenticity amidst constraints …

Fortifying strong PUFs: A modeling attack-resilient approach using weak PUF for IoT device security

S Alahmadi, K Khalil, H Idriss… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Strong Physical Unclonable Functions (PUFs) have gained traction as lightweight
authentication solutions for IoT devices. However, their vulnerability to machine learning …

Strong puf security metrics: Response sensitivity to small challenge perturbations

F Kappelhoff, R Rasche… - … on Quality Electronic …, 2022 - ieeexplore.ieee.org
This paper belongs to a sequence of manuscripts that discuss generic and easy-to-apply
security metrics for Strong PUFs. These metrics cannot and shall not fully replace in-depth …

Systematically quantifying cryptanalytic nonlinearities in strong PUFs

D Chatterjee, K Pratihar, A Hazra… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) with large challenge space (also called Strong
PUFs) are promoted for usage in authentications and various other cryptographic and …

Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks

C Xu, L Zhang, PI Mak, RP Martins… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this paper, we propose a fully symmetrical obfuscated-interconnection PUF (SOI PUF),
which contains delay stages with each stage having obfuscated interconnections for …

A novel attack on machine-learning resistant physical unclonable functions

D Canaday, WAS Barbosa… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Many of today's proposed designs for strong physical unclonable functions (PUFs) are
constructed from strong PUF building blocks that are known to be themselves vulnerable to …