We a good story
Quick delivery in the UK

Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs

About Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs

This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.

Show more
  • Language:
  • English
  • ISBN:
  • 9783031292064
  • Binding:
  • Hardback
  • Pages:
  • 132
  • Published:
  • May 3, 2023
  • Edition:
  • 23001
  • Dimensions:
  • 160x13x241 mm.
  • Weight:
  • 371 g.
Delivery: 2-4 weeks
Expected delivery: December 11, 2024

Description of Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs

This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.

User ratings of Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs



Find similar books
The book Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs can be found in the following categories:

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.