A Computationally Efficient Tensor Regression Network based Modeling Attack on XOR Arbiter PUF and its Variants
暂无分享,去创建一个
[1] Masaya Yoshikawa,et al. Deep learning attack for physical unclonable function , 2016, 2016 IEEE 5th Global Conference on Consumer Electronics.
[2] Ulrich Rührmair,et al. The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks , 2019, IACR Cryptol. ePrint Arch..
[3] Tamara G. Kolda,et al. Tensor Decompositions and Applications , 2009, SIAM Rev..
[4] Patrick Schaumont,et al. Offline Hardware/Software Authentication for Reconfigurable Platforms , 2006, CHES.
[5] Jean-Pierre Seifert,et al. Why Attackers Win: On the Learnability of XOR Arbiter PUFs , 2015, TRUST.
[6] Jean-Pierre Seifert,et al. Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones , 2019, PROOFS.
[7] Andrzej Cichocki,et al. Decomposition of Big Tensors With Low Multilinear Rank , 2014, ArXiv.
[8] Kazukuni Kobara,et al. Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays , 2014, J. Inf. Process..
[9] Philip S. Yu,et al. DuSK: A Dual Structure-preserving Kernel for Supervised Tensor Learning with Applications to Neuroimages , 2014, SDM.
[10] Giuseppe Brandi. Decompose et Impera: tensor methods in high-dimensional data , 2018 .
[11] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[12] Jean-Pierre Seifert,et al. PAC learning of arbiter PUFs , 2016, Journal of Cryptographic Engineering.
[13] Joelle Pineau,et al. Tensor Regression Networks with various Low-Rank Tensor Approximations , 2017, ArXiv.
[14] Jan Sölter,et al. Efficient Power and Timing Side Channels for Physical Unclonable Functions , 2014, CHES.
[15] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[16] Georg T. Becker,et al. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs , 2015, CHES.
[17] Domenic Forte,et al. Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[18] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[19] Xiaowei Yang,et al. A Linear Support Higher-Order Tensor Machine for Classification , 2013, IEEE Transactions on Image Processing.
[20] Anima Anandkumar,et al. Tensor Contraction Layers for Parsimonious Deep Nets , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[21] Anima Anandkumar,et al. Tensor Regression Networks , 2017, J. Mach. Learn. Res..
[22] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[23] Marian Margraf,et al. Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance , 2019, IACR Cryptol. ePrint Arch..
[24] Srinivas Devadas,et al. A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication , 2016, IEEE Transactions on Multi-Scale Computing Systems.
[25] Debdeep Mukhopadhyay,et al. A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security , 2018, IEEE Transactions on Computers.
[26] Patrick Schaumont,et al. An Analysis of Delay Based PUF Implementations on FPGA , 2010, ARC.
[27] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[28] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[29] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[30] Johan Håstad,et al. Tensor Rank is NP-Complete , 1989, ICALP.
[31] Georg T. Becker,et al. On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation , 2015, RFIDSec.
[32] Debdeep Mukhopadhyay,et al. A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[33] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[34] Ulrich Rührmair,et al. PUFs in Security Protocols: Attack Models and Security Evaluations , 2013, 2013 IEEE Symposium on Security and Privacy.