A Computationally Efficient Tensor Regression Network based Modeling Attack on XOR Arbiter PUF and its Variants

[1]  Masaya Yoshikawa,et al.  Deep learning attack for physical unclonable function , 2016, 2016 IEEE 5th Global Conference on Consumer Electronics.

[2]  Ulrich Rührmair,et al.  The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks , 2019, IACR Cryptol. ePrint Arch..

[3]  Tamara G. Kolda,et al.  Tensor Decompositions and Applications , 2009, SIAM Rev..

[4]  Patrick Schaumont,et al.  Offline Hardware/Software Authentication for Reconfigurable Platforms , 2006, CHES.

[5]  Jean-Pierre Seifert,et al.  Why Attackers Win: On the Learnability of XOR Arbiter PUFs , 2015, TRUST.

[6]  Jean-Pierre Seifert,et al.  Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones , 2019, PROOFS.

[7]  Andrzej Cichocki,et al.  Decomposition of Big Tensors With Low Multilinear Rank , 2014, ArXiv.

[8]  Kazukuni Kobara,et al.  Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays , 2014, J. Inf. Process..

[9]  Philip S. Yu,et al.  DuSK: A Dual Structure-preserving Kernel for Supervised Tensor Learning with Applications to Neuroimages , 2014, SDM.

[10]  Giuseppe Brandi Decompose et Impera: tensor methods in high-dimensional data , 2018 .

[11]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[12]  Jean-Pierre Seifert,et al.  PAC learning of arbiter PUFs , 2016, Journal of Cryptographic Engineering.

[13]  Joelle Pineau,et al.  Tensor Regression Networks with various Low-Rank Tensor Approximations , 2017, ArXiv.

[14]  Jan Sölter,et al.  Efficient Power and Timing Side Channels for Physical Unclonable Functions , 2014, CHES.

[15]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[16]  Georg T. Becker,et al.  The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs , 2015, CHES.

[17]  Domenic Forte,et al.  Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[18]  Yuan Yu,et al.  TensorFlow: A system for large-scale machine learning , 2016, OSDI.

[19]  Xiaowei Yang,et al.  A Linear Support Higher-Order Tensor Machine for Classification , 2013, IEEE Transactions on Image Processing.

[20]  Anima Anandkumar,et al.  Tensor Contraction Layers for Parsimonious Deep Nets , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[21]  Anima Anandkumar,et al.  Tensor Regression Networks , 2017, J. Mach. Learn. Res..

[22]  G. Edward Suh,et al.  Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[23]  Marian Margraf,et al.  Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance , 2019, IACR Cryptol. ePrint Arch..

[24]  Srinivas Devadas,et al.  A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication , 2016, IEEE Transactions on Multi-Scale Computing Systems.

[25]  Debdeep Mukhopadhyay,et al.  A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security , 2018, IEEE Transactions on Computers.

[26]  Patrick Schaumont,et al.  An Analysis of Delay Based PUF Implementations on FPGA , 2010, ARC.

[27]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[28]  Miodrag Potkonjak,et al.  Lightweight secure PUFs , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.

[29]  Srinivas Devadas,et al.  Modeling attacks on physical unclonable functions , 2010, CCS '10.

[30]  Johan Håstad,et al.  Tensor Rank is NP-Complete , 1989, ICALP.

[31]  Georg T. Becker,et al.  On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation , 2015, RFIDSec.

[32]  Debdeep Mukhopadhyay,et al.  A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[33]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[34]  Ulrich Rührmair,et al.  PUFs in Security Protocols: Attack Models and Security Evaluations , 2013, 2013 IEEE Symposium on Security and Privacy.