[1] |
SAHOO D P , NGUYEN P H , MUKHOPADHYAY D ,et al. A case of lightweight PUF constructions:cryptanalysis and machine learning attacks[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015,34(8): 1334-1343.
|
[2] |
LIU Y , XIE Y , BAO C ,et al. A combined optimization-theoretic and side-channel approach for attacking strong physical unclonable functions[J]. IEEE Transactions on Very Large Scale Integration Systems, 2017,26(1): 73-81.
|
[3] |
RüHRMAIR U , S?LTER J , SEHNKE F ,et al. PUF modeling attacks on simulated and silicon data[J]. IEEE Transactions on Information Forensics & Security, 2013,8(11): 1876-1891.
|
[4] |
YE J , GUO Q , HU Y ,et al. Modeling attacks on strong physical unclonable functions strengthened by random number and weak PUF[C]// 2018 IEEE 36th VLSI Test Symposium. 2018: 1-6.
|
[5] |
DELVAUX J . Machine-learning attacks on PolyPUFs,OB-PUFs,RPUFs,LHS-PUFs,and PUF–FSMs[J]. IEEE Transactions on Information Forensics and Security, 2019,14(8): 2043-2058.
|
[6] |
宋蕾, 马春光, 段广晗 . 机器学习安全及隐私保护研究进展[J]. 网络与信息安全学报, 2018,4(8): 1-11.
|
|
SONG L , MA C G , DUAN G H . Machine learning security and privacy:a survey[J]. Chinese Journal of Network and Information Security, 2018,4(8): 1-11.
|
[7] |
BIGGIO B , NELSON B , LASKOV P . Poisoning attacks against support vector machines[C]// ICML'12 2012. 14671-1474.
|
[8] |
JAGIELSKI M , OPREA A , BIGGIO B ,et al. Manipulating machine learning:poisoning attacks and countermeasures for regression learning[C]// 2018 IEEE Symposium on Security and Privacy. 2018. 19-35.
|
[9] |
BIGGIO B , ROLI F . Wild patterns:ten years after the rise of adversarial machine learning[J]. Pattern Recognition, 2018,84: 317-331.
|
[10] |
BECKER G T , . The gap between promise and reality:on the insecurity of XOR arbiter PUFs[C]// Cryptographic Hardware and Embedded Systems. 2015: 535-555.
|
[11] |
WANG S J , CHEN Y S , KATHERINE L ,et al. Adversarial attack against modeling attack on PUFs[C]// DAC2019. 2019: 1-6.
|
[12] |
PRADO H , PATIL C . Defeating strong PUF modeling attack via adverse selection of challenge-response pairs[C]// AsianHOST2018. 2018: 25-30.
|
[13] |
XU X , MAHMOUD A , MAJZOOBI M ,et al. Efficient power and timing side channels for physical unclonable functions[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2014: 476-492.
|
[14] |
GAO Y , LI G , MA H ,et al. Obfuscated challenge-response:a secure lightweight authentication mechanism for PUF-based pervasive devices[C]// Workshop in Conjunction with IEEE International Conference on Pervasive Computing and Communications. 2016: 1-6.
|
[15] |
JING Y , YU H , LI X . RPUF:physical unclonable function with randomized challenge to resist modeling attack[C]// Hardware-oriented Security & Trust. 2016: 1-6.
|
[16] |
徐金甫, 吴缙, 李军伟 . 基于敏感度混淆机制的控制型物理不可复制函数研究[J]. 电子与信息学报, 2019,41(7): 1601-1609.
|
|
XU J F , WU J , LI J W . Research on the control physical non-clonable function based on sensitivity cofounding mechanism[J]. Journal of Electronics and Information Technology, 2019,41(7): 1601-1609.
|