Machine learning and hardware security: Challenges and opportunities

F Regazzoni, S Bhasin, AA Pour, I Alshaer… - Proceedings of the 39th …, 2020 - dl.acm.org
Machine learning techniques have significantly changed our lives. They helped improving
our everyday routines, but they also demonstrated to be an extremely helpful tool for more …

A PUF-based modeling-attack resilient authentication protocol for IoT devices

M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …

A survey on silicon PUFs

F Zerrouki, S Ouchani, H Bouarfa - Journal of Systems Architecture, 2022 - Elsevier
Abstract Integrated Circuits (ICs) and electronic devices have become an integral part of
daily human life (mobile, home, car, etc.). However, specific security measures should be …

Two sides of the same coin: Boons and banes of machine learning in hardware security

W Liu, CH Chang, X Wang, C Liu… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …

DTA-PUF: Dynamic timing-aware physical unclonable function for resource-constrained devices

I Tsiokanos, J Miskelly, C Gu, M O'neill… - ACM Journal on …, 2021 - dl.acm.org
In recent years, physical unclonable functions (PUFs) have gained a lot of attention as
mechanisms for hardware-rooted device authentication. While the majority of the previously …

A novel modeling-attack resilient arbiter-PUF design

M Ebrahimabadi, M Younis… - … Conference on VLSI …, 2021 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) have been considered as promising lightweight
primitives for random number generation and device authentication. Thanks to the …

Countering modeling attacks in puf-based iot security solutions

W Lalouani, M Younis, M Ebrahimabadi… - ACM Journal on …, 2022 - dl.acm.org
Hardware fingerprinting has emerged as a viable option for safeguarding IoT devices from
cyberattacks. Such a fingerprint is used to not only authenticate the interconnected devices …

P-MAP: PUF-based mutual authentication protocol

M Alkanhal, M Younis - ICC 2022-IEEE International …, 2022 - ieeexplore.ieee.org
The Internet of Things refers to the large-scale internetworking of diverse devices, many of
them with very limited computational resources. Given the ad-hoc formation of the network …

Security layers and related services within the Horizon Europe NEUROPULS project

F Pavanello, C Marchand, P Jimenez… - … , Automation & Test …, 2024 - ieeexplore.ieee.org
In the contemporary security landscape, the incorporation of photonics has emerged as a
transformative force, unlocking a spectrum of possibilities to enhance the resilience and …

Countering PUF modeling attacks through adversarial machine learning

M Ebrahimabadi, W Lalouani… - 2021 IEEE Computer …, 2021 - ieeexplore.ieee.org
A Physically Unclonable Function (PUF) is an effective option for device authentication,
especially for IoT frame-works with resource-constrained devices. However, PUFs are …