2016 IEEE 25th Asian Test Symposium (ATS) 2016
DOI: 10.1109/ats.2016.21
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Attack on Non-linear Current Mirror PUF with Genetic Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…For PUFs, [70,73] are two of the first studies focusing on this by employing evolution strategies and genetic programming against feed-forward Arbiter PUFs and RO PUFs, respectively. In this context, the security of recently emerging PUF architectures, e.g., non-linear current mirror PUFs [47] has been compromised through genetic algorithms [34].…”
Section: Ai-enabled Attacksmentioning
confidence: 99%
“…For PUFs, [70,73] are two of the first studies focusing on this by employing evolution strategies and genetic programming against feed-forward Arbiter PUFs and RO PUFs, respectively. In this context, the security of recently emerging PUF architectures, e.g., non-linear current mirror PUFs [47] has been compromised through genetic algorithms [34].…”
Section: Ai-enabled Attacksmentioning
confidence: 99%
“…1,[11][12][13][14][15] Machine learning (ML)-based attacks that predict responses for as-of-yet-unseen challenges have become an increasing threat to PUFs of all variants. 5,[16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31] These attacks do not directly represent the transformation between challenges and responses, but rather predict the result of that transformation after learning from a set of CRPs collected from a given PUF. Machine-learning-based attacks, including regression mappings, state vector machines, k-nearest neighbors, random forests, genetic algorithms, artificial neural networks, and generative adversarial networks, have proven effective against various conventional PUFs, and additional work has developed theoretical relationships between the number of CRPs used for training and response prediction accuracy.…”
Section: Introductionmentioning
confidence: 99%
“…However, they cannot meet the needs of IoT devices due to the limited density and scaling trend of CMOS technology; therefore, CMOS-based PUF designs encounter the same constraints, such as high power dissipation and large area. It is well known that most PUF designs are vulnerable to machine learning (ML) attacks [6]; therefore, new anti-attack PUF designs are needed. When the feature size is reduced to nanoscales, the design and manufacturing of ICs face even greater challenges.…”
Section: Introductionmentioning
confidence: 99%