PUF modeling attacks: An introduction and overview

@article{Rhrmair2014PUFMA,
  title={PUF modeling attacks: An introduction and overview},
  author={Ulrich R{\"u}hrmair and Jan S{\"o}lter},
  journal={2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)},
  year={2014},
  pages={1-6}
}
Machine learning (ML) based modeling attacks are the currently most relevant and effective attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide an overview of this method in this paper: We discuss (i) the basic conditions under which it is applicable; (ii) the ML algorithms that have been used in this context; (iii) the latest and most advanced results; (iv) the right interpretation of existing results; and (v) possible future research directions. 

Tables and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-10 OF 21 CITATIONS

A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design

  • 2018 IEEE 3rd International Verification and Security Workshop (IVSW)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

A Modeling Attack Resistant Scheme Based on Fault Injection

  • 2018 IEEE 3rd International Conference on Signal and Image Processing (ICSIP)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

Lorenz Chaotic System-Based Carbon Nanotube Physical Unclonable Functions

  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  • 2018
VIEW 1 EXCERPT
CITES METHODS

Machine Learning based Modeling Attacks on a Configurable PUF

  • NAECON 2018 - IEEE National Aerospace and Electronics Conference
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Lightweight Key Management for Group Communication in Body Area Networks through Physical Unclonable Functions

  • 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 52 REFERENCES

Modeling attacks on physical unclonable functions

  • ACM Conference on Computer and Communications Security
  • 2010
VIEW 9 EXCERPTS

Pattern recognition and machine learning

C. M. Bishop
  • Springer New York:,
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise

  • 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
  • 2013
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Devadas : Lightweight and Secure PUF Key Storage Using Limits of Machine Learning

S.
  • CHES
  • 2014

Hybrid side-channel/machine-learning attacks on PUFs: A new threat?

  • 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)
  • 2014

PUFs at a glance

  • 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)
  • 2014
VIEW 3 EXCERPTS