Abstract. In this paper we demonstrate the first real-world cloning at-tack on a commercial PUF-based RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol executions, which takes less than 200 ms. Using a RFID smartcard emulator, it is then pos-sible to impersonate, i.e., “clone ” the PUF. While attacking the 4-way PUF used by these tags can be done using traditional machine learning attacks, we show that the tags can still be attacked if they are config-ured as presumably secure XOR PUFs. We achieved this by using a new reliability-based machine learning attack that uses a divide-and-conquer approach for attacking the XOR PUFs. This new divide-and-conquer approach results in only a linear increase in needed n...
In a novel analysis, we formally prove that arbitrarily many Arbiter PUFs can be combined into a sta...
Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained IoT ...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
Abstract. Physical Unclonable Functions (PUFs) are seen as a promis-ing alternative to traditional c...
have emerged as a promising solution for securing resource-constrained embedded devices such as RFID...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
The widespread adoption of Internet of Things (IoT) devices in various application domains has signi...
have been proposed as efficient hardware security primitives for generating device-unique authentica...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
Building lightweight security for low-cost pervasivedevices is a major challenge considering the des...
Arbiter Physical unclonable function (A-PUF) with exponential number of challenges is an ideal candi...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
Silicon Physical Unclonable Functions (PUFs) have been proposed as an emerging hardware security pri...
Abstract. The Bistable Ring (BR) Physical Unclonable Function (PUF) is a newly proposed hardware sec...
In a novel analysis, we formally prove that arbitrarily many Arbiter PUFs can be combined into a sta...
Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained IoT ...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
Abstract. Physical Unclonable Functions (PUFs) are seen as a promis-ing alternative to traditional c...
have emerged as a promising solution for securing resource-constrained embedded devices such as RFID...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
The widespread adoption of Internet of Things (IoT) devices in various application domains has signi...
have been proposed as efficient hardware security primitives for generating device-unique authentica...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
Building lightweight security for low-cost pervasivedevices is a major challenge considering the des...
Arbiter Physical unclonable function (A-PUF) with exponential number of challenges is an ideal candi...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
Silicon Physical Unclonable Functions (PUFs) have been proposed as an emerging hardware security pri...
Abstract. The Bistable Ring (BR) Physical Unclonable Function (PUF) is a newly proposed hardware sec...
In a novel analysis, we formally prove that arbitrarily many Arbiter PUFs can be combined into a sta...
Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained IoT ...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...