2020 IEEE International Conference on Electro Information Technology (EIT) 2020
DOI: 10.1109/eit48999.2020.9208320
|View full text |Cite
|
Sign up to set email alerts
|

Defense Mechanism Vulnerability Analysis of Ring Oscillator PUFs Against Neural Network Modeling Attacks using the Dragonfly Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…There are a few research works where NNs have been used to analyze the vulnerabilities of cryptosystems. The use of feed-forward NNs FNNs has been applied to the vulnerability analysis of Physical Unclonable Functions (PUFs) [48]. More specifically FNNs are being used to model out attack scenarios against the Challenge Response Pairs (CRPs) of the PUFs [48].…”
Section: Vulnerability Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…There are a few research works where NNs have been used to analyze the vulnerabilities of cryptosystems. The use of feed-forward NNs FNNs has been applied to the vulnerability analysis of Physical Unclonable Functions (PUFs) [48]. More specifically FNNs are being used to model out attack scenarios against the Challenge Response Pairs (CRPs) of the PUFs [48].…”
Section: Vulnerability Analysismentioning
confidence: 99%
“…The use of feed-forward NNs FNNs has been applied to the vulnerability analysis of Physical Unclonable Functions (PUFs) [48]. More specifically FNNs are being used to model out attack scenarios against the Challenge Response Pairs (CRPs) of the PUFs [48]. It was found that given very few CRPs as a baseline, an FNN using the Dragonfly Algorithm(DA) was able to accurately predict more challenge-response pairs with a 85.2% accuracy attacking the Configurable Ring Oscillator PUF and 71.3% against the XOR-inverter Ring Oscillator PUF [48].…”
Section: Vulnerability Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In our earlier work [43], we presented an analytical study of the vulnerability of the Configurable Ring Oscillator PUF and the XOR-Inverter Ring Oscillator PUF against Feed-Forward Neural Network (FNN) attacks using the Dragonfly Algorithm. That limited study showed that both designs are vulnerable to this type of attack.…”
Section: Introductionmentioning
confidence: 99%