A noise bifurcation architecture for linear additive physical functions
@article{Yu2014ANB, title={A noise bifurcation architecture for linear additive physical functions}, author={M. Yu and David M'Ra{\"i}hi and I. Verbauwhede and S. Devadas}, journal={2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)}, year={2014}, pages={124-129} }
Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. Popular realizations use linear additive functions as building blocks. Security is scaled up using non-linear mixing (e.g., adding XORs). Because the responses are physically derived and thus noisy, the resulting explosion in noise impacts both the adversary (which is desirable) as well as the verifier (which is undesirable). We present the… CONTINUE READING
54 Citations
Comprehensive study of physical unclonable functions on FPGAs: correlation driven Implementation, deep learning modeling attacks, and countermeasures
- Computer Science
- 2020
- 1
PolyPUF: Physically Secure Self-Divergence
- Computer Science
- IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- 2016
- 9
On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
- Computer Science
- RFIDSec
- 2015
- 55
- Highly Influenced
- PDF
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs
- Computer Science
- ArXiv
- 2018
- 2
- Highly Influenced
- PDF
Improving Security and Reliability of Physical Unclonable Functions Using Machine Learning
- Computer Science
- 2018
- 1
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2015
- 5
- Highly Influenced
- PDF
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
- Computer Science, Materials Science
- IEEE Transactions on Information Forensics and Security
- 2020
- 1
- PDF
Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication
- Computer Science
- ArXiv
- 2017
- 4
- PDF
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2019
- 10
- PDF
Enhancing PUF reliability by machine learning
- Computer Science
- 2017 IEEE International Symposium on Circuits and Systems (ISCAS)
- 2017
- 8
References
SHOWING 1-10 OF 31 REFERENCES
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
- Engineering, Computer Science
- 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
- 2013
- 116
- PDF
Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes
- Computer Science, Engineering
- IEEE Transactions on Circuits and Systems I: Regular Papers
- 2014
- 98
- PDF
Performance metrics and empirical results of a PUF cryptographic key generation ASIC
- Computer Science
- 2012 IEEE International Symposium on Hardware-Oriented Security and Trust
- 2012
- 74
- PDF
PUF Modeling Attacks on Simulated and Silicon Data
- Computer Science, Materials Science
- IEEE Transactions on Information Forensics and Security
- 2013
- 323
- PDF
Combined Modeling and Side Channel Attacks on Strong PUFs
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2013
- 99
- Highly Influential
- PDF
Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability
- Computer Science
- 2012 IEEE International Workshop on Information Forensics and Security (WIFS)
- 2012
- 123
- PDF
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
- Computer Science
- CHES
- 2011
- 93
- PDF
Extracting secret keys from integrated circuits
- Engineering, Computer Science
- IEEE Transactions on Very Large Scale Integration (VLSI) Systems
- 2005
- 785
- PDF