2018 IEEE 36th VLSI Test Symposium (VTS) 2018
DOI: 10.1109/vts.2018.8368627
|View full text |Cite
|
Sign up to set email alerts
|

Modeling attacks on strong physical unclonable functions strengthened by random number and weak PUF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…However, given that the obfuscation mechanism is not proven to be stronger than for two pioneering proposals, i.e., Slender PUFs by Rostami et al [20] and Noise Bifurcation PUFs by Yu et al [25], both of which were broken by Becker and Tobisch [6], [7] even when instantiated with a (costly) 4-XOR PUF, it is unclear why one or more non-XORed Arbiter PUFs would suddenly suffice. • For the RPUF protocol [10], [22], the exploitation of its LFSR is not unexpected, given that Delvaux et al [4,Chapter 5] previously reported similar problems for other PUF-based authentication protocols. The most notable resemblance is to the protocol of Van Herrewege et al [31], where an attacker also takes advantage of the LFSR by generating overlapping challenge streams.…”
Section: The Importance Of Literature Studymentioning
confidence: 86%
See 4 more Smart Citations
“…However, given that the obfuscation mechanism is not proven to be stronger than for two pioneering proposals, i.e., Slender PUFs by Rostami et al [20] and Noise Bifurcation PUFs by Yu et al [25], both of which were broken by Becker and Tobisch [6], [7] even when instantiated with a (costly) 4-XOR PUF, it is unclear why one or more non-XORed Arbiter PUFs would suddenly suffice. • For the RPUF protocol [10], [22], the exploitation of its LFSR is not unexpected, given that Delvaux et al [4,Chapter 5] previously reported similar problems for other PUF-based authentication protocols. The most notable resemblance is to the protocol of Van Herrewege et al [31], where an attacker also takes advantage of the LFSR by generating overlapping challenge streams.…”
Section: The Importance Of Literature Studymentioning
confidence: 86%
“…As the randomizing effect of nonce n is bypassed through this sliding-window technique, an unprotected Arbiter PUF remains. 4) New Protocol Version: Independently of the above thirdparty security analysis 1 , the authors of the RPUF protocol [10] continued their investigative efforts and were able to mount a successful machine-learning attack based on simulated annealing and ES [22]. In an attempt to maintain the original security claim, they specified a lesser efficient version of the protocol.…”
Section: Puf-enabled Devicementioning
confidence: 99%
See 3 more Smart Citations