2019
DOI: 10.1109/tifs.2019.2891223
|View full text |Cite
|
Sign up to set email alerts
|

Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs

Abstract: A physically unclonable function (PUF) is a circuit of which the input-output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence facilitates the authentication of any given device in a population of identically laid-out silicon chips, similar to the biometric authentication of a human.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 135 publications
(29 citation statements)
references
References 33 publications
0
29
0
Order By: Relevance
“…ANNs) are used to compromise the security of the PUF circuits and protocols developed in [44], [45]. We test the performance of the ANN on the LPA protocol to show its resilience to this modeling method.…”
Section: ) Ann and Svm Attacksmentioning
confidence: 99%
“…ANNs) are used to compromise the security of the PUF circuits and protocols developed in [44], [45]. We test the performance of the ANN on the LPA protocol to show its resilience to this modeling method.…”
Section: ) Ann and Svm Attacksmentioning
confidence: 99%
“…PUFs are gradually being proposed as central building blocks for cryptographic protocols and security architectures for IoT and IoE systems [160]. Unlike other classic cryptographic primitives, where the degree of security can be compared to well-established security proof, the security of PUFs relies on assumptions about physical properties and is a subject of great interest these days [161]. SRAM PUFs can facilitate IoE security by providing integrated, lightweight cryptographic primitives for authentication, and certification without substantial modifications to the design or manufacturing process.…”
Section: Cyber Resilience Of Pufsmentioning
confidence: 99%
“…As stated earlier the security of the PUFs is dependent on the size of the CRPs. Large set of CRPs make strong PUFs potentially vulnerable to machine learning assisted cyber attacks only [161]. These attacks originates as MITM and hackers getting hold of the CRPs database of the PUFs.…”
Section: Man-in-the-middle (Mitm)mentioning
confidence: 99%
“…HELP is a variant of a strong PUF and, as such, is therefore theoretically susceptible to model-building attacks [16], which can be extraordinarily effective if employed via machine learning techniques [26]. Despite improvements, XOR Arbiter PUFs [27] remain particularly vulnerable to machine learning attacks [28]. HELP is resilient against machine learning attacks because the source of entropy is a complex combinational logic block implemented without identically designed layout structures.…”
Section: Model-building Attacksmentioning
confidence: 99%