2018 IEEE 23rd International Conference on Digital Signal Processing (DSP) 2018
DOI: 10.1109/icdsp.2018.8631638
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Attack Analysis of Configurable Ring Oscillator (CRO) PUF Designs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…The total delay difference ∆D is the superposition of ∆D (i). While ∆D (i) for traditional CRO PUFs (∆D (i) of CRO PUF [7], [8], RRO PUF [10], XCRO PUF [9] can be considered the same) is proved to be ∆D [16]. According to Eq.…”
Section: A Delay Model Of Transformer Pufmentioning
confidence: 98%
See 2 more Smart Citations
“…The total delay difference ∆D is the superposition of ∆D (i). While ∆D (i) for traditional CRO PUFs (∆D (i) of CRO PUF [7], [8], RRO PUF [10], XCRO PUF [9] can be considered the same) is proved to be ∆D [16]. According to Eq.…”
Section: A Delay Model Of Transformer Pufmentioning
confidence: 98%
“…As analysed above, conventional CRO PUFs are vulnerable to modeling attack since their delay model are relatively simple. Previous MPUF attempted to increase the resistance to machine learning attack by XORing the challenges with the unknown outputs of weak PUFs in [16]. However, the improved MPUF still suffers from the machine learning attack while consuming more hardware resources.…”
Section: B Machine Learning Attacks On Transformer Pufmentioning
confidence: 99%
See 1 more Smart Citation
“…CRO-PUF Miskelly et al [89] Main advantage of CRO over RO is that it is much more efficient in terms of space and component usage.…”
Section: Sklavos Et Al [87]mentioning
confidence: 99%
“…Several works perform a successful modeling attack on the arbiterbased PUFs [2], RO-based PUFs [3] and its improvements [4]. Furthermore, some MA-resilience PUFs, including the XOR arbiter PUF [5], bistable ring PUF [6], twisted bistable ring PUF [7], double arbiter PUF [8], configurable ring oscillator PUF [9], and lightweight secure PUF [10], are not immune to advanced modeling attacks. On the one hand, modeling attacks with machine learning algorithms have become a serious threat to the security of PUFs and PUFbased solutions.…”
Section: Introductionmentioning
confidence: 99%