2021
DOI: 10.1007/978-3-030-70881-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Attacks and Efficient Countermeasures on Interpose PUF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…However, hardware cost of XOR PUF as well as the percentage of unstable responses exponentially increase with the increasing number of APUF components in an XOR PUF [31]. Moreover, in recent years, different variants of the modeling attacks have been reported to break XOR PUF architectures when given sufficient CRPs [23], [24], [25], [26], [29], [30], [31], [32], [33]. Several approaches have been introduced that utilize pre-extracted delay parameters to improve the security of XOR APUFs [32], [34], [35].…”
Section: Introductionmentioning
confidence: 99%
“…However, hardware cost of XOR PUF as well as the percentage of unstable responses exponentially increase with the increasing number of APUF components in an XOR PUF [31]. Moreover, in recent years, different variants of the modeling attacks have been reported to break XOR PUF architectures when given sufficient CRPs [23], [24], [25], [26], [29], [30], [31], [32], [33]. Several approaches have been introduced that utilize pre-extracted delay parameters to improve the security of XOR APUFs [32], [34], [35].…”
Section: Introductionmentioning
confidence: 99%