2018
DOI: 10.1007/978-3-662-58387-6_17
|View full text |Cite
|
Sign up to set email alerts
|

A Fourier Analysis Based Attack Against Physically Unclonable Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
21
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 16 publications
(22 citation statements)
references
References 43 publications
1
21
0
Order By: Relevance
“…In particular, in [GTFS16], Ganji et al introduced a weak PAC learning algorithm, proved its equivalence to a strong PAC algorithm, and applied it to Bistable Ring PUFs. In [GTS18], Ganji et al enhanced their PAC learning methodology. They introduced an improper PAC learning algorithm, making use of Fourier analysis of PUFs in Boolean function representation.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, in [GTFS16], Ganji et al introduced a weak PAC learning algorithm, proved its equivalence to a strong PAC algorithm, and applied it to Bistable Ring PUFs. In [GTS18], Ganji et al enhanced their PAC learning methodology. They introduced an improper PAC learning algorithm, making use of Fourier analysis of PUFs in Boolean function representation.…”
Section: Related Workmentioning
confidence: 99%
“…Besides these targeted attacks, an attack based on the Fourier spectrum properties of Boolean functions has been proposed which proves the vulnerability of multiple PUF classes [13]. In this work, the authors utilize the noise sensitivity property of Boolean functions to learn the Fourier coefficients of the Boolean function representing PUFs.…”
Section: Corollarymentioning
confidence: 99%
“…To the best of our knowledge, PUFmeter [7] is the maiden attempt in this direction, which provides robustness analysis of PUFs with respect to provable ML attacks. PUFmeter leverages average sensitivity, noise sensitivity and k-junta testing measures to come up with a robustness characterization of PUFs attributed by the LMN algorithm [24] based on Fourier analysis [13]. However, PUFmeter framework works with collected CRPs instead of PUF designs as input, hence lacks its adaptability to experiment over the PUF architectural varations and compositions.…”
mentioning
confidence: 99%
“…To enable fair and consistent comparison in the PUF-related literature, we introduce random noise variations to the training sets to emulate the real practice of attacking XOR PUFs on deployed PUF devices when noisy conditions exist. The random noise variations introduced in our experiment can be conventionally modeled as random variables drawn from Gaussian distribution, as suggested by [1,9,23,29]. To do so, we add a random Gaussian noise G noise = gaussian (µ, σ) to the final delay difference ∆ shown in Equation (1).…”
Section: Noisy Attacking Modelmentioning
confidence: 99%