PUF Modeling Attacks on Simulated and Silicon Data
暂无分享,去创建一个
Srinivas Devadas | Frank Sehnke | Jan Sölter | Jürgen Schmidhuber | Ulrich Rührmair | Wayne P. Burleson | Xiaolin Xu | Gideon Dror | Ahmed Mahmoud | Vera Stoyanova | J. Schmidhuber | G. Dror | Frank Sehnke | W. Burleson | S. Devadas | U. Rührmair | J. Sölter | Xiaolin Xu | Ahmed Mahmoud | V. Stoyanova
[1] Srinivas Devadas,et al. Lightweight and Secure PUF Key Storage Using Limits of Machine Learning , 2011, CHES.
[2] Ulrich Rührmair,et al. Characterization of the bistable ring PUF , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[3] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[4] Ivan Damgård,et al. Unconditionally Secure and Universally Composable Commitments from Physical Assumptions , 2013, IACR Cryptol. ePrint Arch..
[5] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[6] Martin A. Riedmiller,et al. A direct adaptive method for faster backpropagation learning: the RPROP algorithm , 1993, IEEE International Conference on Neural Networks.
[7] David Haussler,et al. Learnability and the Vapnik-Chervonenkis dimension , 1989, JACM.
[8] Jean-Pierre Seifert,et al. Cloning Physically Unclonable Functions , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[9] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[10] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[11] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[12] Miodrag Potkonjak,et al. Testing Techniques for Hardware Security , 2008, 2008 IEEE International Test Conference.
[13] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[14] U. Rührmair. Oblivious Transfer based on Physical Unclonable Functions ( Extended Abstract ) , 2010 .
[15] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[16] M. Stutzmann,et al. Random pn-junctions for physical cryptography , 2010 .
[17] Berk Sunar,et al. Towards Robust Low Cost Authentication for Pervasive Devices , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[18] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[19] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[20] Stefan Katzenbeisser,et al. Physically Uncloneable Functions in the Universal Composition Framework , 2011, CRYPTO.
[21] Ulrich Rührmair,et al. Strong PUFs: Models, Constructions, and Security Proofs , 2010, Towards Hardware-Intrinsic Security.
[22] Ulrich Rührmair,et al. Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results , 2012, IACR Cryptol. ePrint Arch..
[23] Salil P. Vadhan,et al. Computational Complexity , 2005, Encyclopedia of Cryptography and Security.
[24] Srinivas Devadas,et al. Controlled physical random functions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[25] Srinivas Devadas,et al. Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..
[26] Jeroen Delvaux,et al. Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.
[27] Jan Sölter. Cryptanalysis of electrical PUFs via machine learning algorithms Kryptoanalyse von elektrischen PUFs durch maschinelle Lernalgorithmen , 2009 .
[28] Ingrid Verbauwhede,et al. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[29] Ulrich Rührmair,et al. Security Applications of Diodes with Unique Current-Voltage Characteristics , 2010, Financial Cryptography.
[30] M. Stutzmann,et al. Applications of High-Capacity Crossbar Memories in Cryptography , 2011, IEEE Transactions on Nanotechnology.
[31] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[32] Blaise L. P. Gassend,et al. Physical random functions , 2003 .
[33] Ulrich Rührmair,et al. The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[34] Thomas Bäck,et al. Evolutionary algorithms in theory and practice - evolution strategies, evolutionary programming, genetic algorithms , 1996 .
[35] Jorge Guajardo,et al. Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[36] Srinivas Devadas,et al. FPGA PUF using programmable delay lines , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[37] Srini Devadas. Physical Unclonable Functions and Secure Processors , 2009, CHES.
[38] Frank Sehnke,et al. On the Foundations of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..
[39] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[40] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[41] W. Porod,et al. Application of mismatched Cellular Nonlinear Networks for Physical Cryptography , 2010, 2010 12th International Workshop on Cellular Nanoscale Networks and their Applications (CNNA 2010).
[42] Cliff Wang,et al. Introduction to Hardware Security and Trust , 2011 .
[43] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .
[44] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[45] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[46] Hans-Paul Schwefel,et al. Evolution and Optimum Seeking: The Sixth Generation , 1993 .
[47] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[48] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[49] Patrick Schaumont,et al. An Analysis of Delay Based PUF Implementations on FPGA , 2010, ARC.
[50] Srinivas Devadas,et al. Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[51] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.