NAECON 2018 - IEEE National Aerospace and Electronics Conference 2018
DOI: 10.1109/naecon.2018.8556818
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning based Modeling Attacks on a Configurable PUF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 5 publications
1
7
0
Order By: Relevance
“…Therefore, such traditional methods are vulnerable to machine-learning attacks, such as logistic regression (LR) or NN attacks. [22] This claim is supported by the test results presented in Section IV.…”
Section: A Modulus Ring Oscillator (Mro)supporting
confidence: 55%
“…Therefore, such traditional methods are vulnerable to machine-learning attacks, such as logistic regression (LR) or NN attacks. [22] This claim is supported by the test results presented in Section IV.…”
Section: A Modulus Ring Oscillator (Mro)supporting
confidence: 55%
“…Consequently, when presented with a set of unknown CRPs, the behavior of the PUF can be accurately predicted [26]. Successful machine learning attacks have been demonstrated using various methods, including Support Vector Machines (SVM), Artificial Neural Networks (ANN), and Multi-Layer Perceptron (MLP) [27][28][29].…”
Section: Attacks On Pufsmentioning
confidence: 99%
“…Models for bistable ring (BR) PUF [14] or twisted bistable ring (TBR) PUF [15] (both PUF based on feedback loops made of multiplexers and NOR gates which must achieve a stable state -the key-) have been reported. Typical solutions are based on support vector machines (SVM) [18]. Some authors have even analyzed different types of algorithms (SVM, genetic algorithms, etc.)…”
Section: Physical Unclonable Functions Modelingmentioning
confidence: 99%