2022
DOI: 10.1109/tcad.2022.3197696
|View full text |Cite
|
Sign up to set email alerts
|

FLAM-PUF: A Response–Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 51 publications
0
7
0
Order By: Relevance
“…Meanwhile, we also simulated the avalanche characteristics of mainstream PUFs. Apart from APUF, the resource consumption of these PUF structures is similar to our proposed structure [ 25 ]. As shown in Figure 14 , these PUFs do not exhibit ideal statistical characteristics.…”
Section: Numerical Experimentsmentioning
confidence: 88%
See 2 more Smart Citations
“…Meanwhile, we also simulated the avalanche characteristics of mainstream PUFs. Apart from APUF, the resource consumption of these PUF structures is similar to our proposed structure [ 25 ]. As shown in Figure 14 , these PUFs do not exhibit ideal statistical characteristics.…”
Section: Numerical Experimentsmentioning
confidence: 88%
“…According to the results of Shah et al [ 32 ], when the number of feedback iterations increases to 8, the reliability of the response output is less than 65%. Similarly, FLAM-PUF [ 25 ] introduces an LFSR between the challenge and the PUF and changes the feedback coefficients of the LFSR through two confusion stages, introducing nonlinearity and randomness. In the first stage, a single-bit response is fed back to a certain feedback coefficient of the LFSR, undergoing n − 1 cycles of confusion and collecting n − 1 bits of response.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed PUF fingerprint offers an additional benefit over challenge-response-based PUFs. With the advancement of machine learning techniques, it has become increasingly challenging to protect challenge-response PUFs against machine learning cloning attacks [ 67 , 68 ]. This provides an additional reason to develop fingerprint PUFs, which are used locally and, as a result, are less susceptible to machine learning attacks.…”
Section: Measurementsmentioning
confidence: 99%
“…The second method requires a third party that stores valid challenge-response pairs [ 66 ]. While challenge-response PUFs are considered strong PUFs, they are vulnerable to Machine Learning attacks [ 67 ], which can model PUF behavior based on collected challenge-response pairs [ 68 ].…”
Section: Introductionmentioning
confidence: 99%