메뉴 건너뛰기




Volumn , Issue , 2012, Pages 37-42

Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability

Author keywords

[No Author keywords available]

Indexed keywords

65NM CMOS; ACCURATE MODELING; CHALLENGE RESPONSE; CHALLENGE-RESPONSE PAIR; CRYPTOGRAPHIC KEY; HARDWARE SECURITY; MACHINE LEARNING TECHNIQUES; PHYSICALLY UNCLONABLE FUNCTIONS; SECRET KEY; SILICON IMPLEMENTATION; TRAINING SETS;

EID: 84874047126     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIFS.2012.6412622     Document Type: Conference Paper
Times cited : (167)

References (14)
  • 2
    • 85016215043 scopus 로고    scopus 로고
    • Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions
    • D. Naccache and A.-R. Sadeghi, Eds. Springer
    • R. Maes and I. Verbauwhede, "Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions," in Towards Hardware-Intrinsic Security, D. Naccache and A.-R. Sadeghi, Eds. Springer, 2010, pp. 3-37.
    • (2010) Towards Hardware-Intrinsic Security , pp. 3-37
    • Maes, R.1    Verbauwhede, I.2
  • 3
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication application
    • J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication application," in Symposium on VLSI Circuits, 2004, pp. 176-159.
    • Symposium on VLSI Circuits, 2004 , pp. 176-1159
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 6
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in DAC, 2007, pp. 9-14.
    • (2007) DAC , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 9
    • 0025751820 scopus 로고
    • Approximation capabilities of multilayer feedforward networks
    • K. Hornik, "Approximation capabilities of multilayer feedforward networks," Neural Networks, vol. 4, no. 2, pp. 251-257, 1991.
    • (1991) Neural Networks , vol.4 , Issue.2 , pp. 251-257
    • Hornik, K.1
  • 11
    • 84943274699 scopus 로고    scopus 로고
    • A direct adaptive method for faster back-propagation learning: The RProp algorithm
    • M. Riedmiller and H. Braun, "A direct adaptive method for faster back-propagation learning: The RProp algorithm," in IEEE Intl. Conference on Neural Networks, 1993, pp. 586-591.
    • IEEE Intl. Conference on Neural Networks, 1993 , pp. 586-591
    • Riedmiller, M.1    Braun, H.2
  • 14
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.