2019
DOI: 10.1007/s13389-019-00204-8
|View full text |Cite
|
Sign up to set email alerts
|

Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…In [129], and [130], x-XOR PUF (x ≤ 6)is demonstrated to be robust against attacks since it takes more computational time to achieve the final response. However, there exists a significant correlation between the challenges assigned randomly to any one of the APUF components.…”
Section: E Modeling Attack On Xor Apufmentioning
confidence: 99%
“…In [129], and [130], x-XOR PUF (x ≤ 6)is demonstrated to be robust against attacks since it takes more computational time to achieve the final response. However, there exists a significant correlation between the challenges assigned randomly to any one of the APUF components.…”
Section: E Modeling Attack On Xor Apufmentioning
confidence: 99%
“…However, as l increases, the reliability of XOR Arbiter-PUF degrades severely [5]. In a study, Wisiol et al [59] proposed a majority vote technique to enable the large and reliable design of XOR Arbiter-PUF, hence increase the resistant against ML-attack. A theorem to compute the upper bound of majority voting has been also developed (refer to [59] for the details).…”
Section: Non-invasive Attack Countermeasuresmentioning
confidence: 99%
“…In a study, Wisiol et al [59] proposed a majority vote technique to enable the large and reliable design of XOR Arbiter-PUF, hence increase the resistant against ML-attack. A theorem to compute the upper bound of majority voting has been also developed (refer to [59] for the details). The resilience of Majority Vote XOR Arbiter-PUF against ML-attack has been evaluated using Becker's CMA-ES reliability attack technique [35].…”
Section: Non-invasive Attack Countermeasuresmentioning
confidence: 99%
“…Majzoobi et al [33] proposed methods for majority voting of responses and classifying the challenges to different reliability sets in order to increase the stability of the corresponding responses in different environmental situations. However, it is shown that the majority voting-based reliability enhancement schemes are not sufficient due to their need to be executed repeatedly many times and store intermediate voting counts in volatile memory [34], [35]. Reconfigurable PUFs have also been proposed not only for enhancing PUF security but also for improving its reliability.…”
Section: A Related Workmentioning
confidence: 99%