Articles with "modeling attacks" as a keyword



Photo by scottwebb from unsplash

Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3132915

Abstract: A physical unclonable function (PUF) generates hardware intrinsic volatile secrets by exploiting uncontrollable manufacturing randomness. Several PUF candidates use challenge-response pairs (CRPs) to enhance their security. A practically plausible idea for PUF is to use… read more here.

Keywords: nck puf; modeling attacks; security; puf ... See more keywords
Photo from wikipedia

Correlation Integral-Based Intrinsic Dimension: A Deep-Learning-Assisted Empirical Metric to Estimate the Robustness of Physically Unclonable Functions to Modeling Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2021.3129112

Abstract: Physically unclonable functions (PUFs) which are robust to modeling attacks, usually have a complex, high-dimensional, nonlinear relationship between challenges and responses. Often, it is difficult to derive closed-form analytical expressions for these relationships. Consequently, it… read more here.

Keywords: physically unclonable; modeling attacks; robustness; correlation ... See more keywords
Photo from wikipedia

Enhancing Reliability and Security: A Configurable Poisoning PUF Against Modeling Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2022.3197529

Abstract: Physically unclonable functions (PUFs) have been widely proposed as hardware primitives for device identification and cryptographic key generation. While strong PUFs provide an exponential number of challenge–response pairs (CRPs) for device authentication, most are vulnerable… read more here.

Keywords: reliability security; reliability; modeling attacks; adversarial based ... See more keywords
Photo from wikipedia

A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"

DOI: 10.1109/tcsi.2022.3206214

Abstract: This paper presents a weak PUF-assisted strong PUF that combines the metrics between weak and strong PUFs. Unlike the conventional strong PUFs that rely on the nonlinear combination of a large number of entropy cells… read more here.

Keywords: assisted strong; puf assisted; strong puf; weak puf ... See more keywords
Photo from wikipedia

Optimization of Combined Power and Modeling Attacks on VR PUFs With Lagrange Multipliers

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2020.2981875

Abstract: In this brief, optimized combined power and modeling attacks (CPMAs) are proposed to crack lightweight strong physical unclonable functions (PUFs): voltage regulator (VR) PUFs. The relationship between input challenge and output response of a VR… read more here.

Keywords: combined power; modeling attacks; power; power modeling ... See more keywords
Photo by alonsoreyes from unsplash

Neural Network Modeling Attacks on Arbiter-PUF-Based Designs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3189533

Abstract: By revisiting, improving, and extending recent neural-network based modeling attacks on XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs, (XOR) Feed-Forward Arbiter PUFs, and Interpose PUFs can be attacked faster, up… read more here.

Keywords: neural network; modeling attacks; network modeling; arbiter pufs ... See more keywords