2015
DOI: 10.1007/978-3-319-24837-0_2
|View full text |Cite
|
Sign up to set email alerts
|

On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
80
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 95 publications
(81 citation statements)
references
References 10 publications
1
80
0
Order By: Relevance
“…Now we analyze the Bochum results with respect to our protocol II, which contains a noise s.c. attack countermeasure. The results that apply are no longer those from [18] (which requires noise s.c. information), but the ones in [17], which are shown as red-thick lines. For an 8-XOR PUF, 4·10 7 CRPs were used, which supports 1·10 4 authentication events.…”
Section: Ruhr-university Bochum Attacks (2015)mentioning
confidence: 97%
See 3 more Smart Citations
“…Now we analyze the Bochum results with respect to our protocol II, which contains a noise s.c. attack countermeasure. The results that apply are no longer those from [18] (which requires noise s.c. information), but the ones in [17], which are shown as red-thick lines. For an 8-XOR PUF, 4·10 7 CRPs were used, which supports 1·10 4 authentication events.…”
Section: Ruhr-university Bochum Attacks (2015)mentioning
confidence: 97%
“…It attempts to produce an exponential number of CRPs from a linear number of circuit components where the response bits are difficult to predict. Practical strong PUFs are composed of linear circuits in order to prevent physical noise amplification and are therefore prone to modeling attacks, e.g., using machine learning [14], [15], [16], [17], [18].…”
Section: Strong and Weak Pufsmentioning
confidence: 99%
See 2 more Smart Citations
“…These techniques increase the unpredictability of the PUFs, however, still they incurred high area overhead. There is also another technique of obfuscating the PUF responses which utilizes noise bifurcation [69]. The downside of this technique is that the software model must be developed and stored on the server's side.…”
Section: Comparison Analysis Of Defense Mechanisms Against Attacksmentioning
confidence: 99%