Physical Unclonable Functions (PUFs) have been designed for many security applications such as identification, authentication of devices and key generation, especially for lightweight electronics. Traditional approaches to enhancing security, such as hash functions, may be expensive and resource dependent. However, modelling attacks using machine learning (ML) show the vulnerability of most PUFs. In this paper, a combination of a 32-bit current mirror and 16-bit arbiter PUFs in 65nm CMOS technology is proposed to improve resilience against modelling attacks. Both PUFs are vulnerable to machine learning attacks and we reduce the output prediction rate from 99.2% and 98.8% individually, to 60%.</p
Arbiter Physical unclonable function (A-PUF) with exponential number of challenges is an ideal candi...
Abstract. The Bistable Ring (BR) Physical Unclonable Function (PUF) is a newly proposed hardware sec...
have emerged as a promising solution for securing resource-constrained embedded devices such as RFID...
Physical Unclonable Functions (PUF) with exponentially growing number of challenges is an ideal cand...
Building lightweight security for low-cost pervasivedevices is a major challenge considering the des...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
have been proposed as efficient hardware security primitives for generating device-unique authentica...
Adversarial machine learning is an emerging threat to security of Machine Learning (ML)-based system...
Abstract. Physical Unclonable Functions (PUFs) are seen as a promis-ing alternative to traditional c...
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, an...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
Model building attack on Physical Unclonable Functions (PUFs) by using machine learning (ML) techniq...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
A novel strong physical unclonable function (PUF), called Probability-based PUF (Prob-PUF), is propo...
Arbiter Physical unclonable function (A-PUF) with exponential number of challenges is an ideal candi...
Abstract. The Bistable Ring (BR) Physical Unclonable Function (PUF) is a newly proposed hardware sec...
have emerged as a promising solution for securing resource-constrained embedded devices such as RFID...
Physical Unclonable Functions (PUF) with exponentially growing number of challenges is an ideal cand...
Building lightweight security for low-cost pervasivedevices is a major challenge considering the des...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
have been proposed as efficient hardware security primitives for generating device-unique authentica...
Adversarial machine learning is an emerging threat to security of Machine Learning (ML)-based system...
Abstract. Physical Unclonable Functions (PUFs) are seen as a promis-ing alternative to traditional c...
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, an...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
Model building attack on Physical Unclonable Functions (PUFs) by using machine learning (ML) techniq...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
A novel strong physical unclonable function (PUF), called Probability-based PUF (Prob-PUF), is propo...
Arbiter Physical unclonable function (A-PUF) with exponential number of challenges is an ideal candi...
Abstract. The Bistable Ring (BR) Physical Unclonable Function (PUF) is a newly proposed hardware sec...
have emerged as a promising solution for securing resource-constrained embedded devices such as RFID...