Attacking Delay-based PUFs with Minimal Adversary Model Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar | Published: 2024-03-01 Evaluation Methods for PUFModel Performance EvaluationAttack Method 2024.03.01 2025.05.27 Literature Database
CycPUF: Cyclic Physical Unclonable Function Authors: Michael Dominguez, Amin Rezaei | Published: 2024-02-12 FPGAEvaluation Methods for PUFWatermark Evaluation 2024.02.12 2025.05.27 Literature Database
Machine Learning Resistant Amorphous Silicon Physically Unclonable Functions (PUFs) Authors: Velat Kilic, Neil Macfarlane, Jasper Stround, Samuel Metais, Milad Alemohammad, A. Brinton Cooper, Amy C. Foster, Mark A. Foster | Published: 2024-02-05 Evaluation Methods for PUFDeep Learning MethodLinear Regression 2024.02.05 2025.05.27 Literature Database
Breaking XOR Arbiter PUFs without Reliability Information Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03 Evaluation Methods for PUFWatermarkingAttack Method 2023.12.03 2025.05.28 Literature Database
Active learning for fast and slow modeling attacks on Arbiter PUFs Authors: Vincent Dumoulin, Wenjing Rao, Natasha Devroye | Published: 2023-08-25 Evaluation Methods for PUFActive LearningMachine Learning Method 2023.08.25 2025.05.28 Literature Database
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02 Evaluation Methods for PUFSecurity AssuranceTraining Protocol 2022.06.02 2025.05.28 Literature Database