Efficient Attack on Non-linear Current Mirror PUF with Genetic Algorithm
暂无分享,去创建一个
Yu Hu | Xiaowei Li | Jing Ye | Yue Gong | Qingli Guo
[1] Ulrich Rührmair,et al. PUFs at a glance , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[2] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[3] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[4] O. Kaynak,et al. Low power, current mode CMOS circuits for synthesis of arbitrary nonlinear functions , 2000 .
[5] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[6] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, ICCAD 2008.
[7] Yu Hu,et al. OPUF: Obfuscation logic based physical unclonable function , 2015, 2015 IEEE 21st International On-Line Testing Symposium (IOLTS).
[8] Thomas Bäck,et al. Evolutionary algorithms in theory and practice - evolution strategies, evolutionary programming, genetic algorithms , 1996 .
[9] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[10] Yu Hu,et al. POSTER: Attack on Non-Linear Physical Unclonable Function , 2016, CCS.
[11] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[12] Sandip Kundu,et al. A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[13] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[14] Wayne P. Burleson,et al. On design of a highly secure PUF based on non-linear current mirrors , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[15] Berk Sunar,et al. A tamper-proof and lightweight authentication scheme , 2008, Pervasive Mob. Comput..
[16] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[17] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[18] Berk Sunar,et al. Towards Robust Low Cost Authentication for Pervasive Devices , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).