Machine learning and hardware security: Challenges and opportunities
Machine learning techniques have significantly changed our lives. They helped improving
our everyday routines, but they also demonstrated to be an extremely helpful tool for more …
our everyday routines, but they also demonstrated to be an extremely helpful tool for more …
A PUF-based modeling-attack resilient authentication protocol for IoT devices
M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …
A survey on silicon PUFs
Abstract Integrated Circuits (ICs) and electronic devices have become an integral part of
daily human life (mobile, home, car, etc.). However, specific security measures should be …
daily human life (mobile, home, car, etc.). However, specific security measures should be …
Two sides of the same coin: Boons and banes of machine learning in hardware security
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …
machine learning (ML) and hardware security. The confluence of the two technologies has …
DTA-PUF: Dynamic timing-aware physical unclonable function for resource-constrained devices
I Tsiokanos, J Miskelly, C Gu, M O'neill… - ACM Journal on …, 2021 - dl.acm.org
In recent years, physical unclonable functions (PUFs) have gained a lot of attention as
mechanisms for hardware-rooted device authentication. While the majority of the previously …
mechanisms for hardware-rooted device authentication. While the majority of the previously …
A novel modeling-attack resilient arbiter-PUF design
M Ebrahimabadi, M Younis… - … Conference on VLSI …, 2021 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) have been considered as promising lightweight
primitives for random number generation and device authentication. Thanks to the …
primitives for random number generation and device authentication. Thanks to the …
Countering modeling attacks in puf-based iot security solutions
Hardware fingerprinting has emerged as a viable option for safeguarding IoT devices from
cyberattacks. Such a fingerprint is used to not only authenticate the interconnected devices …
cyberattacks. Such a fingerprint is used to not only authenticate the interconnected devices …
P-MAP: PUF-based mutual authentication protocol
M Alkanhal, M Younis - ICC 2022-IEEE International …, 2022 - ieeexplore.ieee.org
The Internet of Things refers to the large-scale internetworking of diverse devices, many of
them with very limited computational resources. Given the ad-hoc formation of the network …
them with very limited computational resources. Given the ad-hoc formation of the network …
Security layers and related services within the Horizon Europe NEUROPULS project
In the contemporary security landscape, the incorporation of photonics has emerged as a
transformative force, unlocking a spectrum of possibilities to enhance the resilience and …
transformative force, unlocking a spectrum of possibilities to enhance the resilience and …
Countering PUF modeling attacks through adversarial machine learning
M Ebrahimabadi, W Lalouani… - 2021 IEEE Computer …, 2021 - ieeexplore.ieee.org
A Physically Unclonable Function (PUF) is an effective option for device authentication,
especially for IoT frame-works with resource-constrained devices. However, PUFs are …
especially for IoT frame-works with resource-constrained devices. However, PUFs are …