Before the reconfiguration is performed during authentication the PUF simply does not exist. Hence even if an attacker has the chip under control previously she can gain no useful information about the PUF. This feature, together with a strict renunciation of any error correction and challenge ...
时,偏差补偿Arbiter PUF电路可以生成响应R i 、偏移方向D i 和可靠标志位F i ;R i 和D i 被保存起来,在响应重构阶段,当再次输入该激励C i 时,可以根据辅助数据D i 和F i 恢复出响应R i 。 2.根据权利要求1所述的电路,所述偏差补偿模块由一个附加延迟单元、两个二选二多路选择器A ...
的物理不可克隆函数(PuF),利用芯片生产过程中因工艺等原因造成延时偏差作为PuF的产生机制,对基于Arbiter~ PuF的物理结构提出了改进,在路径中加入了延时模块,并通过实验在现场可编程逻辑器件(FPGA)上验证了改进方案 在安全性能方面的优越性。 关键词:密码芯片;物理不可克隆函数;仲裁器激励响应对 ...
Modeling attacks, in which an adversary uses machine learning techniques to model a hardware-based Physically Unclonable Function (PUF) pose a great threat to the viability of these hardware security primitives. In most modeling attacks, a random subset of challenge-response-pairs (CRPs) are used ...
In these Cross-PUF attacks, the attacker has at his disposal a reference PUF, and uses its power side-channel to train a machine learning model which can be deployed to attack other identical PUFs. The experimental results show the high success of the proposed attacks even in presence of ...
针对Lim等提出的基于Arbiter的物理不可克隆函数(PUF),利用芯片生产过程中因工艺等原因造成延时偏差作为PUF的产生机制,对基于Arbiter的PUF的物理结构提出了改进,在路径中加入了延时模块,并通过实验在现场可编程逻辑器件(FPGA)上验... 查看全部>> 暂无资源 收藏 引用 分享 推荐文章 基于PUF的安全协议研究 物理...
介绍Daihyun等设计的仲 裁器物理不可克隆函数(PUF)方案,指出其不足之处.在此基础上提出一种改进方案,设计并分析基于D触发器的仲裁器PUF,在FPGA平台上实现并测试 该方... 张俊钦,谷大武,侯方勇 - 《计算机工程》 被引量: 16发表: 2010年 PAC Learning of Arbiter PUFs (extended version) Arbiter PUFDeterm...
Machine Learning Attack on Majority Based Arbiter Physical Unclonable Functions (PUFs) attack xor puf unclonable cma-es xor-arbiter-pufs machine-learning-attack physical-unclonable-functions majority-vote Updated Sep 30, 2017 TeX Improve this page Add a description, image, and links to the xor...
CMOS PUF is getting more attention from both research community and the industry because it allows cost-efficient integration of device's digital signature for highly secured authentication protocols. Leveraged on usually-undesirable uncontrollable and random variations in CMOS fabrication process, many ...
While attacking the 4-way PUF used by these tags can be done using traditional machine learning attacks, we show that the tags can still be attacked if they are configured as presumably secure XOR PUFs. We achieved this by using a new reliability-based machine learning attack that uses a ...