2016
DOI: 10.1007/978-3-319-44524-3_16
|View full text |Cite
|
Sign up to set email alerts
|

Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…DAPUF is also evaluated under the ML attack. In [10], the authors reported that an attack on DAPUF using Deep Learning (DL) was unsuccessful. However, they also reported that DAPUF has a lot of unstable responses, which makes it unsuitable for conventional authentication system.…”
Section: Introductionmentioning
confidence: 99%
“…DAPUF is also evaluated under the ML attack. In [10], the authors reported that an attack on DAPUF using Deep Learning (DL) was unsuccessful. However, they also reported that DAPUF has a lot of unstable responses, which makes it unsuitable for conventional authentication system.…”
Section: Introductionmentioning
confidence: 99%
“…Ensemble learning is a technique of merging the predictions from several classifiers to generate a robust classifier. An emerging machine learning algorithm namely deep learning (DL) was also used to perform modeling attack on strong PUFs as proposed by Yashiro et al [8]. They described that DL has superior performance compared to conventional machine-learning methods on a benchmark test in the field of image recognition.…”
Section: ) Attacks On Strong Pufsmentioning
confidence: 99%
“…The first category is designbased where the defense mechanism is added in the architectural design of the PUFs such as adding non-linearity using XOR logics [6], [7], modifying transistor-level design [8], exploiting FPGA blocks [9], [10] and analogizing the digital components [11]. The second category is the obfuscation-based where the defense mechanism is performed masking of either challenges [12] or responses [2], [13].…”
Section: Background Of the Problemmentioning
confidence: 99%
See 2 more Smart Citations