2021
DOI: 10.52549/ijeei.v9i1.2664
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Multiplexed and Obfuscated Physical Unclonable Function

Abstract: Model building attack on Physical Unclonable Functions (PUFs) by using machine learning (ML) techniques has been a focus in the PUF research area. PUF is a hardware security primitive which can extract unique hardware characteristics (i.e., device-specific) by exploiting the intrinsic manufacturing process variations during integrated circuit (IC) fabrication. The nature of the manufacturing process variations which is random and complex makes a PUF realistically and physically impossible to clone atom-by-atom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…When a set of binary bit-stream known as the challenge is applied onto the PUF, a corresponding unique and random binary output known as the response is generated. The challenge and response generation is also known as the mapping of challengeresponse pair (CRP) [3]. The device-specific response generated from a particular PUF can be used to uniquely distinguish a sensor node from a group of similar nodes.…”
Section: Introductionmentioning
confidence: 99%
“…When a set of binary bit-stream known as the challenge is applied onto the PUF, a corresponding unique and random binary output known as the response is generated. The challenge and response generation is also known as the mapping of challengeresponse pair (CRP) [3]. The device-specific response generated from a particular PUF can be used to uniquely distinguish a sensor node from a group of similar nodes.…”
Section: Introductionmentioning
confidence: 99%