{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T16:42:39Z","timestamp":1770568959149,"version":"3.49.0"},"publisher-location":"Cham","reference-count":97,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030987947","type":"print"},{"value":"9783030987954","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98795-4_5","type":"book-chapter","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:03:58Z","timestamp":1649354638000},"page":"85-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Physically Unclonable Functions and\u00a0AI"],"prefix":"10.1007","author":[{"given":"Fatemeh","family":"Ganji","sequence":"first","affiliation":[]},{"given":"Shahin","family":"Tajik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"issue":"3","key":"5_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s41635-019-00071-z","volume":"3","author":"LS de Ara\u00fajo","year":"2019","unstructured":"de Ara\u00fajo, L.S., et al.: Design of robust, high-entropy strong PUFs via weightless neural network. J. Hardw. Syst. Secur. 3(3), 235\u2013249 (2019). https:\/\/doi.org\/10.1007\/s41635-019-00071-z","journal-title":"J. Hardw. Syst. Secur."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.R., Standaert, F.X., Wachsmann, C.: A formalization of the security features of physical functions. In: 2011 IEEE Symposium on Security and Privacy, pp. 397\u2013412. IEEE (2011)","DOI":"10.1109\/SP.2011.10"},{"key":"5_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804090","volume-title":"Computational Complexity: A Modern Approach","author":"S Arora","year":"2009","unstructured":"Arora, S., Barak, B.: Computational Complexity: A Modern Approach. Cambridge University Press, Cambridge (2009)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Awano, H., Iizuka, T., Ikeda, M.: PUFNet: a deep neural network based modeling attack for physically unclonable function. In: 2019 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/ISCAS.2019.8702431"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-662-48324-4_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"GT Becker","year":"2015","unstructured":"Becker, G.T.: The gap between promise and reality: on the insecurity of XOR arbiter PUFs. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 535\u2013555. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_27"},{"key":"5_CR6","unstructured":"Becker, G.T., Kumar, R., et al.: Active and passive side-channel attacks on delay based PUF designs. IACR Cryptology ePrint Archive 2014, 287 (2014)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chatterjee, D., Mukhopadhyay, D., Hazra, A.: PUF-G: a CAD framework for automated assessment of provable learnability from formal PUF representations. In: Proceedings of the 39th International Conference on Computer-Aided Design, pp. 1\u20139 (2020)","DOI":"10.1145\/3400302.3415647"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Q., Csaba, G., Lugli, P., Schlichtmann, U., R\u00fchrmair, U.: The bistable ring PUF: a new architecture for strong physical unclonable functions. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 134\u2013141. IEEE (2011)","DOI":"10.1109\/HST.2011.5955011"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Chowdhury, S., et al.: A weak asynchronous RESet (ARES) PUF using start-up characteristics of null conventional logic gates. In: IEEE International Test Conference (ITC). IEEE (2020)","DOI":"10.1109\/ITC44778.2020.9325278"},{"issue":"8","key":"5_CR10","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1109\/TIFS.2019.2891223","volume":"14","author":"J Delvaux","year":"2019","unstructured":"Delvaux, J.: Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs. IEEE Trans. Inf. Forensics Secur. 14(8), 2043\u20132058 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"5_CR11","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TCAD.2014.2370531","volume":"34","author":"J Delvaux","year":"2014","unstructured":"Delvaux, J., Gu, D., Schellekens, D., Verbauwhede, I.: Helper data algorithms for PUF-based key generation: overview and analysis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6), 889\u2013902 (2014)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/978-3-662-53140-2_20","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"J Delvaux","year":"2016","unstructured":"Delvaux, J., Gu, D., Verbauwhede, I., Hiller, M., Yu, M.-D.M.: Efficient fuzzy extraction of PUF-induced secrets: theory and applications. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 412\u2013431. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_20"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Verbauwhede, I.: Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 137\u2013142. IEEE (2013)","DOI":"10.1109\/HST.2013.6581579"},{"issue":"6","key":"5_CR14","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1109\/TCSI.2013.2290845","volume":"61","author":"J Delvaux","year":"2014","unstructured":"Delvaux, J., Verbauwhede, I.: Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. IEEE Trans. Circuits Syst. I Regul. Pap. 61(6), 1701\u20131713 (2014)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Verbauwhede, I.: Key-recovery attacks on various RO PUF constructions via helper data manipulation. In: 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1\u20136. IEEE (2014)","DOI":"10.7873\/DATE.2014.085"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Dubrova, E., N\u00e4slund, O., Degen, B., Gawell, A., Yu, Y.: CRC-PUF: a machine learning attack resistant lightweight PUF construction. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 264\u2013271. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00036"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Ganji, F., Amir, S., Tajik, S., Forte, D., Seifert, J.P.: Pitfalls in machine learning-based adversary modeling for hardware systems. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 514\u2013519. IEEE (2020)","DOI":"10.23919\/DATE48585.2020.9116316"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"122513","DOI":"10.1109\/ACCESS.2019.2938408","volume":"7","author":"F Ganji","year":"2019","unstructured":"Ganji, F., Forte, D., Seifert, J.P.: PUFmeter a property testing tool for assessing the robustness of physically unclonable functions to machine learning attacks. IEEE Access 7, 122513\u2013122521 (2019)","journal-title":"IEEE Access"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Ganji, F., Kr\u00e4mer, J., Seifert, J.P., Tajik, S.: Lattice basis reduction attack against physically unclonable functions. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1070\u20131080 (2015)","DOI":"10.1145\/2810103.2813723"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-662-53140-2_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"F Ganji","year":"2016","unstructured":"Ganji, F., Tajik, S., F\u00e4\u00dfler, F., Seifert, J.-P.: Strong machine learning attack against PUFs with no mathematical model. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 391\u2013411. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_19"},{"issue":"2","key":"5_CR21","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s13389-017-0159-4","volume":"7","author":"F Ganji","year":"2017","unstructured":"Ganji, F., Tajik, S., F\u00e4\u00dfler, F., Seifert, J.-P.: Having no mathematical model may not secure PUFs. J. Cryptogr. Eng. 7(2), 113\u2013128 (2017). https:\/\/doi.org\/10.1007\/s13389-017-0159-4","journal-title":"J. Cryptogr. Eng."},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-319-30840-1_22","volume-title":"Information Security and Cryptology - ICISC 2015","author":"F Ganji","year":"2016","unstructured":"Ganji, F., Tajik, S., Seifert, J.-P.: Let me prove it to you: RO PUFs are provably learnable. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 345\u2013358. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30840-1_22"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-22846-4_2","volume-title":"Trust and Trustworthy Computing","author":"F Ganji","year":"2015","unstructured":"Ganji, F., Tajik, S., Seifert, J.-P.: Why attackers win: on the learnability of XOR arbiter PUFs. In: Conti, M., Schunter, M., Askoxylakis, I. (eds.) Trust 2015. LNCS, vol. 9229, pp. 22\u201339. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22846-4_2"},{"issue":"3","key":"5_CR24","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s13389-016-0119-4","volume":"6","author":"F Ganji","year":"2016","unstructured":"Ganji, F., Tajik, S., Seifert, J.P.: Pac learning of arbiter PUFs. J. Cryptogr. Eng. 6(3), 249\u2013258 (2016)","journal-title":"J. Cryptogr. Eng."},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-662-58387-6_17","volume-title":"Financial Cryptography and Data Security","author":"F Ganji","year":"2018","unstructured":"Ganji, F., Tajik, S., Seifert, J.-P.: A Fourier analysis based attack against physically unclonable functions. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 310\u2013328. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_17"},{"issue":"2","key":"5_CR26","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s13389-020-00226-7","volume":"11","author":"F Ganji","year":"2020","unstructured":"Ganji, F., Tajik, S., Stauss, P., Seifert, J.-P., Tehranipoor, M., Forte, D.: Rock\u2019n\u2019roll PUFs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng. 11(2), 105\u2013118 (2020). https:\/\/doi.org\/10.1007\/s13389-020-00226-7","journal-title":"J. Cryptogr. Eng."},{"issue":"2","key":"5_CR27","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/s41928-020-0372-5","volume":"3","author":"Y Gao","year":"2020","unstructured":"Gao, Y., Al-Sarawi, S.F., Abbott, D.: Physical unclonable functions. Nat. Electron. 3(2), 81\u201391 (2020)","journal-title":"Nat. Electron."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Controlled physical random functions. In: Proceedings of 18th Annual Computer Security Applications Conference, pp. 149\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"issue":"4","key":"5_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1284680.1284683","volume":"10","author":"B Gassend","year":"2008","unstructured":"Gassend, B., Dijk, M.V., Clarke, D., Torlak, E., Devadas, S., Tuyls, P.: Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. (TISSEC) 10(4), 1\u201322 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"11","key":"5_CR31","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1002\/cpe.805","volume":"16","author":"B Gassend","year":"2004","unstructured":"Gassend, B., Lim, D., Clarke, D., Van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. Concurr. Comput. Pract. Exp. 16(11), 1077\u20131098 (2004)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Gehrer, S., Sigl, G.: Reconfigurable PUFs for FPGA-based SoCs. In: 2014 International Symposium on Integrated Circuits (ISIC), pp. 140\u2013143. IEEE (2014)","DOI":"10.1109\/ISICIR.2014.7029535"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Gehrer, S., Sigl, G.: Using the reconfigurability of modern FPGAs for highly efficient PUF-based key generation. In: 2015 10th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/ReCoSoC.2015.7238105"},{"key":"5_CR34","unstructured":"Goldreich, O.: Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press, Cambridge (2007)"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_5"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Guo, Q., Ye, J., Gong, Y., Hu, Y., Li, X.: Efficient attack on non-linear current mirror PUF with genetic algorithm. In: 2016 IEEE 25th Asian Test Symposium (ATS), pp. 49\u201354. IEEE (2016)","DOI":"10.1109\/ATS.2016.21"},{"issue":"6","key":"5_CR37","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.pmcj.2008.07.001","volume":"4","author":"G Hammouri","year":"2008","unstructured":"Hammouri, G., \u00d6zt\u00fcrk, E., Sunar, B.: A tamper-proof and lightweight authentication scheme. Pervasive Mob. Comput. 4(6), 807\u2013818 (2008)","journal-title":"Pervasive Mob. Comput."},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Helfmeier, C., Boit, C., Nedospasov, D., Seifert, J.P.: Cloning physically unclonable functions. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/HST.2013.6581556"},{"issue":"1","key":"5_CR39","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TDSC.2016.2536609","volume":"14","author":"C Herder","year":"2016","unstructured":"Herder, C., Ren, L., Van Dijk, M., Yu, M.D., Devadas, S.: Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions. IEEE Trans. Dependable Secure Comput. 14(1), 65\u201382 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"9","key":"5_CR40","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2008","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198\u20131210 (2008)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Hospodar, G., Maes, R., Verbauwhede, I.: Machine learning attacks on 65nm arbiter PUFs: accurate modeling poses strict bounds on usability. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 37\u201342. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Kalai, A.T., Mansour, Y., Verbin, E.: On agnostic boosting and parity learning. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 629\u2013638 (2008)","DOI":"10.1145\/1374376.1374466"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Kang, H., Hori, Y., Satoh, A.: Performance evaluation of the first commercial PUF-embedded RFID. In: Global Conference on Consumer Electronics, pp. 5\u20138. IEEE (2012)","DOI":"10.1109\/GCCE.2012.6379926"},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Karakoyunlu, D., Sunar, B.: Differential template attacks on PUF enabled cryptographic devices. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/WIFS.2010.5711445"},{"issue":"3","key":"5_CR45","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s13389-011-0016-9","volume":"1","author":"S Katzenbeisser","year":"2011","unstructured":"Katzenbeisser, S., Kocaba\u015f, \u00dc., Van Der Leest, V., Sadeghi, A.R., Schrijen, G.J., Wachsmann, C.: Recyclable PUFs: logically reconfigurable PUFs. J. Cryptogr. Eng. 1(3), 177 (2011)","journal-title":"J. Cryptogr. Eng."},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Khalafalla, M., Gebotys, C.: PUFs deep attacks: enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 204\u2013209. IEEE (2019)","DOI":"10.23919\/DATE.2019.8714862"},{"key":"5_CR47","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-14452-3_3","volume-title":"Towards Hardware-Intrinsic Security","author":"I Kim","year":"2010","unstructured":"Kim, I., Maiti, A., Nazhandali, L., Schaumont, P., Vivekraja, V., Zhang, H.: From statistics to circuits: foundations for future physical unclonable functions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 55\u201378. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14452-3_3"},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"Kumar, R., Burleson, W.: Hybrid modeling attacks on current-based PUFs. In: 2014 IEEE 32nd International Conference on Computer Design (ICCD), pp. 493\u2013496. IEEE (2014)","DOI":"10.1109\/ICCD.2014.6974725"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Kumar, R., Burleson, W.: On design of a highly secure PUF based on non-linear current mirrors. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 38\u201343. IEEE (2014)","DOI":"10.1109\/HST.2014.6855565"},{"key":"5_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-319-24837-0_4","volume-title":"Radio Frequency Identification","author":"Raghavan Kumar","year":"2015","unstructured":"Kumar, Raghavan, Burleson, Wayne: Side-channel assisted modeling attacks on feed-forward arbiter PUFs using silicon data. In: Mangard, Stefan, Schaumont, Patrick (eds.) RFIDSec 2015. LNCS, vol. 9440, pp. 53\u201367. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24837-0_4"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Kursawe, K., Sadeghi, A.R., Schellekens, D., Skoric, B., Tuyls, P.: Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 22\u201329. IEEE (2009)","DOI":"10.1109\/HST.2009.5225058"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Lao, Y., Parhi, K.K.: Novel reconfigurable silicon physical unclonable functions. In: Proceedings of Workshop on Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS), pp. 30\u201336 (2011)","DOI":"10.1109\/EIT.2011.5978614"},{"key":"5_CR53","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., Van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 04CH37525), pp. 176\u2013179. IEEE (2004)"},{"key":"5_CR54","unstructured":"Lim, D.: Extracting secret keys from integrated circuits. Ph.D. thesis, Massachusetts Institute of Technology (2004)"},{"key":"5_CR55","doi-asserted-by":"crossref","unstructured":"Machida, T., Yamamoto, D., Iwamoto, M., Sakiyama, K.: A new mode of operation for arbiter PUF to improve uniqueness on FPGA. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 871\u2013878. IEEE (2014)","DOI":"10.15439\/2014F140"},{"key":"5_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7","volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"R Maes","year":"2013","unstructured":"Maes, R.: Physically Unclonable Functions: Constructions, Properties and Applications. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41395-7"},{"key":"5_CR57","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","volume-title":"Towards Hardware-Intrinsic Security","author":"R Maes","year":"2010","unstructured":"Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 3\u201337. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14452-3_1"},{"key":"5_CR58","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-1-4614-1362-2_11","volume-title":"Embedded Systems Design with FPGAs","author":"A Maiti","year":"2013","unstructured":"Maiti, A., Gunreddy, V., Schaumont, P.: A systematic method to evaluate and compare the performance of physical unclonable functions. In: Athanas, P., Pnevmatikatos, D., Sklavos, N. (eds.) Embedded Systems Design with FPGAs, pp. 245\u2013267. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-1-4614-1362-2_11"},{"issue":"1","key":"5_CR59","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TIFS.2011.2165540","volume":"7","author":"A Maiti","year":"2011","unstructured":"Maiti, A., Kim, I., Schaumont, P.: A robust physical unclonable function with enhanced challenge-response set. IEEE Trans. Inf. Forensics Secur. 7(1), 333\u2013345 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR60","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure PUFs. In: 2008 IEEE\/ACM International Conference on Computer-Aided Design, pp. 670\u2013673. IEEE (2008)","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"5_CR61","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing techniques for hardware security. In: 2008 IEEE International Test Conference, pp. 1\u201310. IEEE (2008)","DOI":"10.1109\/TEST.2008.4700636"},{"key":"5_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1502781.1502786","volume":"2","author":"M Majzoobi","year":"2009","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Techniques for design and implementation of secure reconfigurable PUFs. ACM Trans. Reconfigurable Technol. Syst. (TRETS) 2, 1\u201333 (2009)","journal-title":"ACM Trans. Reconfigurable Technol. Syst. (TRETS)"},{"key":"5_CR63","doi-asserted-by":"crossref","unstructured":"Merli, D., Heyszl, J., Heinz, B., Schuster, D., Stumpf, F., Sigl, G.: Localized electromagnetic analysis of RO PUFs. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 19\u201324. IEEE (2013)","DOI":"10.1109\/HST.2013.6581559"},{"key":"5_CR64","doi-asserted-by":"crossref","unstructured":"Merli, D., Schuster, D., Stumpf, F., Sigl, G.: Semi-invasive EM attack on FPGA RO PUFs and countermeasures. In: Proceedings of the Workshop on Embedded Systems Security, pp. 1\u20139 (2011)","DOI":"10.1145\/2072274.2072276"},{"key":"5_CR65","doi-asserted-by":"crossref","unstructured":"Nedospasov, D., Seifert, J.P., Helfmeier, C., Boit, C.: Invasive PUF analysis. In: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 30\u201338. IEEE (2013)","DOI":"10.1109\/FDTC.2013.19"},{"key":"5_CR66","doi-asserted-by":"crossref","unstructured":"Nguyen, P.H., Sahoo, D.P., Chakraborty, R.S., Mukhopadhyay, D.: Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. In: Proceedings of Design, Automation & Test in Europe Conference & Exhibition, pp. 641\u2013646. EDA Consortium (2015)","DOI":"10.7873\/DATE.2015.0699"},{"issue":"2","key":"5_CR67","first-page":"1","volume":"22","author":"PH Nguyen","year":"2016","unstructured":"Nguyen, P.H., Sahoo, D.P., Chakraborty, R.S., Mukhopadhyay, D.: Security analysis of arbiter PUF and its lightweight compositions under predictability test. ACM Trans. Design Autom. Electron. Syst. (TODAES) 22(2), 1\u201328 (2016)","journal-title":"ACM Trans. Design Autom. Electron. Syst. (TODAES)"},{"key":"5_CR68","unstructured":"Nguyen, P.H., Sahoo, D.P., Jin, C., Mahmood, K., van Dijk, M.: MXPUF: secure PUF design against state-of-the-art modeling attacks. IACR Cryptology ePrint Archive 2017, 572 (2017)"},{"key":"5_CR69","doi-asserted-by":"crossref","unstructured":"Nguyen, P.H., Sahoo, D.P., Jin, C., Mahmood, K., R\u00fchrmair, U., van Dijk, M.: The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 243\u2013290 (2019)","DOI":"10.46586\/tches.v2019.i4.243-290"},{"key":"5_CR70","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-40349-1_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"Y Oren","year":"2013","unstructured":"Oren, Y., Sadeghi, A.-R., Wachsmann, C.: On the effectiveness of the remanence decay side-channel to clone memory-based PUFs. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 107\u2013125. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_7"},{"key":"5_CR71","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/3-540-57332-1_36","volume-title":"Advances in Cryptology \u2014 ASIACRYPT \u201991","author":"RL Rivest","year":"1993","unstructured":"Rivest, R.L.: Cryptography and machine learning. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 427\u2013439. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57332-1_36"},{"key":"5_CR72","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237\u2013249. ACM (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"5_CR73","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237\u2013249 (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"5_CR74","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/978-3-662-44709-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"U R\u00fchrmair","year":"2014","unstructured":"R\u00fchrmair, U., et al.: Efficient power and timing side channels for physical unclonable functions. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 476\u2013492. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_26"},{"key":"5_CR75","doi-asserted-by":"crossref","unstructured":"Saha, I., Jeldi, R.R., Chakraborty, R.S.: Model building attacks on physically unclonable functions using genetic programming. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 41\u201344. IEEE (2013)","DOI":"10.1109\/HST.2013.6581563"},{"issue":"3","key":"5_CR76","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TC.2017.2749226","volume":"67","author":"DP Sahoo","year":"2017","unstructured":"Sahoo, D.P., Mukhopadhyay, D., Chakraborty, R.S., Nguyen, P.H.: A multiplexer-based arbiter PUF composition with enhanced reliability and security. IEEE Trans. Comput. 67(3), 403\u2013417 (2017)","journal-title":"IEEE Trans. Comput."},{"issue":"8","key":"5_CR77","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1109\/TCAD.2015.2448677","volume":"34","author":"DP Sahoo","year":"2015","unstructured":"Sahoo, D.P., Nguyen, P.H., Mukhopadhyay, D., Chakraborty, R.S.: A case of lightweight PUF constructions: cryptanalysis and machine learning attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8), 1334\u20131343 (2015)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"5_CR78","doi-asserted-by":"crossref","unstructured":"Sahoo, D.P., Saha, S., Mukhopadhyay, D., Chakraborty, R.S., Kapoor, H.: Composite PUF: a new design paradigm for physically unclonable functions on FPGA. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 50\u201355. IEEE (2014)","DOI":"10.1109\/HST.2014.6855567"},{"key":"5_CR79","unstructured":"Santikellur, P., Bhattacharyay, A., Chakraborty, R.S.: Deep learning based model building attacks on arbiter PUF compositions. Cryptology ePrint Archive, Report 2019\/566 (2019)"},{"key":"5_CR80","doi-asserted-by":"crossref","unstructured":"Schaller, A., et al.: Intrinsic rowhammer PUFs: leveraging the rowhammer effect for improved security. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/HST.2017.7951729"},{"key":"5_CR81","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-319-08593-7_7","volume-title":"Trust and Trustworthy Computing","author":"D Schuster","year":"2014","unstructured":"Schuster, D., Hesselbarth, R.: Evaluation of bistable ring PUFs using single layer neural networks. In: Holz, T., Ioannidis, S. (eds.) Trust 2014. LNCS, vol. 8564, pp. 101\u2013109. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08593-7_7"},{"issue":"4","key":"5_CR82","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"5_CR83","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM\/IEEE Design Automation Conference, pp. 9\u201314. IEEE (2007)","DOI":"10.1109\/DAC.2007.375043"},{"issue":"2","key":"5_CR84","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/s00145-016-9228-6","volume":"30","author":"S Tajik","year":"2017","unstructured":"Tajik, S., et al.: Photonic side-channel analysis of arbiter PUFs. J. Cryptol. 30(2), 550\u2013571 (2017). https:\/\/doi.org\/10.1007\/s00145-016-9228-6","journal-title":"J. Cryptol."},{"key":"5_CR85","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-662-44709-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"S Tajik","year":"2014","unstructured":"Tajik, S., et al.: Physical characterization of arbiter PUFs. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 493\u2013509. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_27"},{"key":"5_CR86","doi-asserted-by":"crossref","unstructured":"Tajik, S., Lohrke, H., Ganji, F., Seifert, J.P., Boit, C.: Laser fault attack on physically unclonable functions. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 85\u201396 (2015)","DOI":"10.1109\/FDTC.2015.19"},{"issue":"11","key":"5_CR87","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"LG Valiant","year":"1984","unstructured":"Valiant, L.G.: A theory of the learnable. Commun. ACM 27(11), 1134\u20131142 (1984)","journal-title":"Commun. ACM"},{"key":"5_CR88","doi-asserted-by":"crossref","unstructured":"Vijayakumar, A., Patil, V.C., Prado, C.B., Kundu, S.: Machine learning resistant strong PUF: Possible or a pipe dream? In: International Symposium on Hardware Oriented Security and Trust (HOST), pp. 19\u201324. IEEE (2016)","DOI":"10.1109\/HST.2016.7495550"},{"key":"5_CR89","doi-asserted-by":"crossref","unstructured":"Wang, S.J., Chen, Y.S., Li, K.S.M.: Adversarial attack against modeling attack on PUFs. In: 2019 56th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2019)","DOI":"10.1145\/3316781.3317761"},{"key":"5_CR90","doi-asserted-by":"crossref","unstructured":"Wisiol, N., et al.: Splitting the interpose PUF: a novel modeling attack strategy. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 97\u2013120 (2020)","DOI":"10.46586\/tches.v2020.i3.97-120"},{"key":"5_CR91","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-24837-0_1","volume-title":"Radio Frequency Identification","author":"X Xu","year":"2015","unstructured":"Xu, X., R\u00fchrmair, U., Holcomb, D.E., Burleson, W.: Security evaluation and enhancement of bistable ring PUFs. In: Mangard, S., Schaumont, P. (eds.) RFIDSec 2015. LNCS, vol. 9440, pp. 3\u201316. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24837-0_1"},{"key":"5_CR92","doi-asserted-by":"crossref","unstructured":"Yamamoto, D., Takenaka, M., Sakiyama, K., Torii, N.: Security evaluation of bistable ring PUFs on FPGAs using differential and linear analysis. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 911\u2013918 (2014)","DOI":"10.15439\/2014F122"},{"key":"5_CR93","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-030-41025-4_6","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"R Yashiro","year":"2020","unstructured":"Yashiro, R., Hori, Y., Katashita, T., Sakiyama, K.: A deep learning attack countermeasure with intentional noise for a PUF-based authentication scheme. In: Simion, E., G\u00e9raud-Stewart, R. (eds.) SecITC 2019. LNCS, vol. 12001, pp. 78\u201394. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41025-4_6"},{"key":"5_CR94","doi-asserted-by":"crossref","unstructured":"Ye, J., Hu, Y., Li, X.: RPUF: physical unclonable function with randomized challenge to resist modeling attack. In: 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/AsianHOST.2016.7835567"},{"issue":"3","key":"5_CR95","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TMSCS.2016.2553027","volume":"2","author":"MDM Yu","year":"2016","unstructured":"Yu, M.D.M., Hiller, M., Delvaux, J., Sowell, R., Devadas, S., Verbauwhede, I.: A lockdown technique to prevent machine learning on PUFs for lightweight authentication. IEEE Trans. Multi-Scale Comput. Syst. 2(3), 146\u2013159 (2016)","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."},{"key":"5_CR96","doi-asserted-by":"crossref","unstructured":"Yu, M.D.M., Verbauwhede, I., Devadas, S., M\u2019Raihi, D.: A noise bifurcation architecture for linear additive physical functions. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 124\u2013129 (2014)","DOI":"10.1109\/HST.2014.6855582"},{"key":"5_CR97","doi-asserted-by":"crossref","unstructured":"Zeitouni, S., Gens, D., Sadeghi, A.R.: It\u2019s hammer time: how to attack (rowhammer-based) DRAM-PUFs. In: 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/DAC.2018.8465890"}],"container-title":["Lecture Notes in Computer Science","Security and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98795-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:07:23Z","timestamp":1649354843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98795-4_5"}},"subtitle":["Two Decades of Marriage"],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987947","9783030987954"],"references-count":97,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98795-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}