2021
DOI: 10.1109/tcsi.2021.3067319
|View full text |Cite
|
Sign up to set email alerts
|

NoPUF: A Novel PUF Design Framework Toward Modeling Attack Resistant PUFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 58 publications
0
6
0
Order By: Relevance
“…However, a highly reliable PUF may be vulnerable to other CRP-based ML modeling methods. [18] Therefore, a new method to overcome such a trade-off is required.…”
Section: G Reliability Based Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…However, a highly reliable PUF may be vulnerable to other CRP-based ML modeling methods. [18] Therefore, a new method to overcome such a trade-off is required.…”
Section: G Reliability Based Modelingmentioning
confidence: 99%
“…Thus, the complexity of the system can be increased and manipulated by varying the parameters of the modulus process, without significant hardware overhead. The proposed design is an alternative framework to NoPUF [18], which can be used to balance ML resiliency and reliability, while improving uniqueness. A recent study (NMQ-PUF [19]) has employed nonmonotonic quantization (NMQ) to enhance the resilience of machine learning (ML) models.…”
Section: Introductionmentioning
confidence: 99%
“…In this kind of attack, the adversary collects a subset of CRPs (typically hundreds of them) and use the aforementioned techniques to build a mathematical model to predict PUF responses. In this respect, several countermeasures at the PUF architecture level have been presented in the literature [32], [33]. In addition, the integration of countermeasures at different levels (including protocol level) is highly recommended.…”
Section: ) Secret Disclosure Attackmentioning
confidence: 99%
“…[7]- [9]. At protocol layer, various authentication schemes and the introduction of random factors can enable trusted verifiers and malicious attackers to obtain asymmetric information to achieve security requirements [10]. However, many protocols have been reported to be broken by sophisticate attacks [11]- [13].…”
Section: Introductionmentioning
confidence: 99%