2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016
DOI: 10.1109/hst.2016.7495550
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning resistant strong PUF: Possible or a pipe dream?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
47
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(48 citation statements)
references
References 14 publications
1
47
0
Order By: Relevance
“…The first category is designbased where the defense mechanism is added in the architectural design of the PUFs such as adding non-linearity using XOR logics [6], [7], modifying transistor-level design [8], exploiting FPGA blocks [9], [10] and analogizing the digital components [11]. The second category is the obfuscation-based where the defense mechanism is performed masking of either challenges [12] or responses [2], [13].…”
Section: Background Of the Problemmentioning
confidence: 99%
See 3 more Smart Citations
“…The first category is designbased where the defense mechanism is added in the architectural design of the PUFs such as adding non-linearity using XOR logics [6], [7], modifying transistor-level design [8], exploiting FPGA blocks [9], [10] and analogizing the digital components [11]. The second category is the obfuscation-based where the defense mechanism is performed masking of either challenges [12] or responses [2], [13].…”
Section: Background Of the Problemmentioning
confidence: 99%
“…All the defense mechanisms resist or at least improve the resiliency of the PUFs against the ML-MA however they come with some shortcomings. In the case of design-based defense mechanisms, adding non-linearity using XOR [6], [7], analogizing the digital components [11] and exploiting the FPGA blocks [4], [10] increase the hardware overhead.…”
Section: Background Of the Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…Logistic regression (LR) and evolution strategies (ES) are two ML techniques used in ML‐based modeling attacks. In a previous study , these methods were utilized to evaluate the resistances of APUF, ROPUF, XOR‐PUF, FF‐APUF, and LSPUF in operating modeling attacks. Nevertheless, ML‐based attacks perform poorly with increasing number of XORs and bit‐length of PUFs.…”
Section: Introductionmentioning
confidence: 99%