2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2022
DOI: 10.1109/host54066.2022.9839919
|View full text |Cite
|
Sign up to set email alerts
|

Identification and Classification of Corrupted PUF Responses via Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…PUF are the Hardware Assisted Security primitives for reliable and lightweight security in resource-constrained environments, such as the IoT and IoMT devices. A PUF creates secret keys from intricate physical characteristics of a material that are challenging to duplicate or clone, rather than preserving secrets [16]. PUF receives inputs in the form of "challenges" and outputs "responses" made up of genuine random numbers.…”
Section: Puf and Machine Learning Attack On Pufmentioning
confidence: 99%
“…PUF are the Hardware Assisted Security primitives for reliable and lightweight security in resource-constrained environments, such as the IoT and IoMT devices. A PUF creates secret keys from intricate physical characteristics of a material that are challenging to duplicate or clone, rather than preserving secrets [16]. PUF receives inputs in the form of "challenges" and outputs "responses" made up of genuine random numbers.…”
Section: Puf and Machine Learning Attack On Pufmentioning
confidence: 99%
“…It gives designers the ability to raise the security of their creations while retaining the adaptability and effectiveness needed for various applications. The generation of secret keys [11][12][13], the generation of random numbers [14][15][16][17], the protection of FPGA intellectual property [18,19], the identification of devices [20], chip authentication [8,17], key exchange/agreement protocols [8,[21][22][23], the prevention of counterfeiting [24], and IoT security [8,[22][23][24][25][26][27] are a few intriguing applications of FPGA-based PUFs.…”
Section: Introductionmentioning
confidence: 99%
“…Error correction requires considerable hardware resources [12]. In [13,14], a convolutional neural network (CNN) model was used to classify the results of SRAM PUF to improve the stability of SRAM PUF. The reliability was improved to 97.34% [15].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, a digital image requires 256KB SRAM cells. The CNN model relies on the GPU to provide massive initial data [13]. The existing convolution model cannot be implemented on IoT devices.…”
Section: Introductionmentioning
confidence: 99%