Physical unclonable function: Architectures, applications and challenges for dependable security

H Ning, F Farha, A Ullah, L Mao - IET Circuits, Devices & …, 2020 - Wiley Online Library
Physical unclonable function (PUF) is hardware‐specific security primitive for providing
cryptographic functionalities that are applicable for secure communication among the …

PUF modeling attacks on simulated and silicon data

U Rührmair, J Sölter, F Sehnke, X Xu… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
We discuss numerical modeling attacks on several proposed strong physical unclonable
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …

Modeling attacks on physical unclonable functions

U Rührmair, F Sehnke, J Sölter, G Dror… - Proceedings of the 17th …, 2010 - dl.acm.org
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be
broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a …

The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks

PH Nguyen, DP Sahoo, C Jin, K Mahmood… - Cryptology ePrint …, 2018 - eprint.iacr.org
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and
stable, and which possesses a rigorous security argument, has been a fundamental problem …

Splitting the interpose PUF: A novel modeling attack strategy

N Wisiol, C Mühl, N Pirnay, PH Nguyen… - IACR Transactions on …, 2020 - tches.iacr.org
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …

PUFs at a glance

U Rührmair, DE Holcomb - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which
has been introduced just about a decade ago. In this paper, we provide a brief and easily …

A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks

DP Sahoo, PH Nguyen… - … on Computer-Aided …, 2015 - ieeexplore.ieee.org
Due to their unique physical properties, physically unclonable functions (PUF) have been
proposed widely as versatile cryptographic primitives. It is desirable that silicon PUF circuits …

[HTML][HTML] Security analysis of machine learning-based puf enrollment protocols: A review

S Khalfaoui, J Leneutre, A Villard, I Gazeau, J Ma… - Sensors, 2021 - mdpi.com
The demand for Internet of Things services is increasing exponentially, and consequently a
large number of devices are being deployed. To efficiently authenticate these objects, the …

PUF modeling attacks: An introduction and overview

U Rührmair, J Sölter - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Machine learning (ML) based modeling attacks are the currently most relevant and effective
attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide …

Lightweight cloud computing-based RFID authentication protocols using PUF for e-healthcare systems

TF Lee, KW Lin, YP Hsieh, KC Lee - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
In the presence of convenience, cloud computing services have increasingly become used
to resolve low-latency and high-efficiency issues. In particular, they can help medical staff …