PUF modeling attacks: An introduction and overview

@article{Rhrmair2014PUFMA,
  title={PUF modeling attacks: An introduction and overview},
  author={Ulrich R{\"u}hrmair and Jan S{\"o}lter},
  journal={2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)},
  year={2014},
  pages={1-6}
}
Machine learning (ML) based modeling attacks are the currently most relevant and effective attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide an overview of this method in this paper: We discuss (i) the basic conditions under which it is applicable; (ii) the ML algorithms that have been used in this context; (iii) the latest and most advanced results; (iv) the right interpretation of existing results; and (v) possible future research directions. 
Highly Cited
This paper has 21 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design

2018 IEEE 3rd International Verification and Security Workshop (IVSW) • 2018
View 1 Excerpt

Lorenz Chaotic System-Based Carbon Nanotube Physical Unclonable Functions

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems • 2018
View 1 Excerpt

Lightweight Key Management for Group Communication in Body Area Networks through Physical Unclonable Functions

2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE) • 2017
View 1 Excerpt

iPUF: Interconnect PUF with Self-Masking Circuit for Performance Enhancement

2017 18th International Workshop on Microprocessor and SOC Test and Verification (MTV) • 2017
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 52 references

Pattern Recognition and Machine Learning

J. Electronic Imaging • 2007
View 4 Excerpts
Highly Influenced

Devadas : Lightweight and Secure PUF Key Storage Using Limits of Machine Learning

S.
CHES • 2014

Hybrid side-channel/machine-learning attacks on PUFs: A new threat?

2014 Design, Automation & Test in Europe Conference & Exhibition (DATE) • 2014

PUFs at a glance

2014 Design, Automation & Test in Europe Conference & Exhibition (DATE) • 2014
View 3 Excerpts

Seifert: Physical Vulnerabilities of Physically Unclonable Functions

C. Helfmeier, D. Nedospasov, S. Tajik, C. Boit, J.-P
Design, Automation and Test in Europe (DATE’14), • 2014
View 1 Excerpt

Cloning Physically Unclonable Functions

2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) • 2013
View 1 Excerpt

Litho-aware and low power design of a secure current-based physically unclonable function

International Symposium on Low Power Electronics and Design (ISLPED) • 2013
View 1 Excerpt

Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise

2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) • 2013

Similar Papers

Loading similar papers…