Neural network modeling attacks on arbiter-PUF-based designs
By revisiting, improving, and extending recent neural-network based modeling attacks on
XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs,(XOR) Feed-Forward …
XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs,(XOR) Feed-Forward …
Tunable nonlinear optical map** in a multiple-scattering cavity
Nonlinear disordered systems are not only a model system for fundamental studies but also
in high demand for practical applications. However, optical nonlinearity based on intrinsic …
in high demand for practical applications. However, optical nonlinearity based on intrinsic …
Transfer-path-based hardware-reuse strong PUF achieving modeling attack resilience with200 million training CRPs
This paper presents a hardware-reuse strong physical unclonable function (PUF) based on
the intrinsic transfer paths (TPs) of a conventional digital multiplier to achieve a strong …
the intrinsic transfer paths (TPs) of a conventional digital multiplier to achieve a strong …
Attacking Delay-based PUFs with Minimal Adversarial Knowledge
Physically Unclonable Functions (PUFs) provide a streamlined solution for lightweight
device authentication. Delay-based Arbiter PUFs, with their ease of implementation and vast …
device authentication. Delay-based Arbiter PUFs, with their ease of implementation and vast …
Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function
J Dofe, S Rajput - Cluster Computing, 2025 - Springer
The rapid integration of IoT devices has ushered in unparalleled convenience and
efficiency. However, ensuring secure communication and authenticity amidst constraints …
efficiency. However, ensuring secure communication and authenticity amidst constraints …
Fortifying strong PUFs: A modeling attack-resilient approach using weak PUF for IoT device security
Strong Physical Unclonable Functions (PUFs) have gained traction as lightweight
authentication solutions for IoT devices. However, their vulnerability to machine learning …
authentication solutions for IoT devices. However, their vulnerability to machine learning …
Strong puf security metrics: Response sensitivity to small challenge perturbations
F Kappelhoff, R Rasche… - … on Quality Electronic …, 2022 - ieeexplore.ieee.org
This paper belongs to a sequence of manuscripts that discuss generic and easy-to-apply
security metrics for Strong PUFs. These metrics cannot and shall not fully replace in-depth …
security metrics for Strong PUFs. These metrics cannot and shall not fully replace in-depth …
Systematically quantifying cryptanalytic nonlinearities in strong PUFs
Physically Unclonable Functions (PUFs) with large challenge space (also called Strong
PUFs) are promoted for usage in authentications and various other cryptographic and …
PUFs) are promoted for usage in authentications and various other cryptographic and …
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks
In this paper, we propose a fully symmetrical obfuscated-interconnection PUF (SOI PUF),
which contains delay stages with each stage having obfuscated interconnections for …
which contains delay stages with each stage having obfuscated interconnections for …
A novel attack on machine-learning resistant physical unclonable functions
D Canaday, WAS Barbosa… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Many of today's proposed designs for strong physical unclonable functions (PUFs) are
constructed from strong PUF building blocks that are known to be themselves vulnerable to …
constructed from strong PUF building blocks that are known to be themselves vulnerable to …