{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:45:11Z","timestamp":1743075911972,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031215131"},{"type":"electronic","value":"9783031215148"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21514-8_21","type":"book-chapter","created":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T13:22:24Z","timestamp":1671196944000},"page":"234-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Highly Non-linear Feed-Forward Arbiter PUF Against Machine Learning Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8784-4844","authenticated-orcid":false,"given":"Aranya","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Sanjeev","family":"Manhas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6993-2744","authenticated-orcid":false,"given":"Bishnu Prasad","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,17]]},"reference":[{"key":"21_CR1","unstructured":"Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, pp. 265\u2013283. OSDI 2016, USENIX Association, USA (2016)"},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Aseeri, A.O., Zhuang, Y., Alkatheiri, M.S.: A machine learning-based security vulnerability study on XOR PUFS for resource-constraint Internet of Things. In: 2018 IEEE International Congress on Internet of Things (ICIOT), pp. 49\u201356 (2018). https:\/\/doi.org\/10.1109\/ICIOT.2018.00014","DOI":"10.1109\/ICIOT.2018.00014"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1109\/TIFS.2020.2968113","volume":"15","author":"SVS Avvaru","year":"2020","unstructured":"Avvaru, S.V.S., Zeng, Z., Parhi, K.K.: Homogeneous and heterogeneous feed-forward xor physical unclonable functions. IEEE Trans. Inf. Forens. Secur. 15, 2485\u20132498 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.2968113","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Avvaru, S.S., Parhi, K.K.: Effect of loop positions on reliability and attack resistance of feed-forward pufs. In: 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 366\u2013371 (2019). https:\/\/doi.org\/10.1109\/ISVLSI.2019.00073","DOI":"10.1109\/ISVLSI.2019.00073"},{"key":"21_CR5","unstructured":"Chollet, F., et al.: Keras (2015). https:\/\/keras.io"},{"issue":"7","key":"21_CR6","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"M Daniele","year":"2012","unstructured":"Daniele, M., Sabrina, S., Francesco, D.P., Imrich, C.: Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497\u20131516 (2012)","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TSM.2009.2017662","volume":"22","author":"BP Das","year":"2009","unstructured":"Das, B.P., Amrutur, B., Jamadagni, H.S., Arvind, N.V., Visvanathan, V.: Within-die gate delay variability measurement using reconfigurable ring oscillator. IEEE Trans. Semiconduct. Manufact. 22(2), 256\u2013267 (2009). https:\/\/doi.org\/10.1109\/TSM.2009.2017662","journal-title":"IEEE Trans. Semiconduct. Manufact."},{"issue":"4","key":"21_CR8","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TSM.2011.2163532","volume":"24","author":"BP Das","year":"2011","unstructured":"Das, B.P., Amrutur, B., Jamadagni, H.S., Arvind, N.V., Visvanathan, V.: Voltage and temperature-aware SSTA using neural network delay model. IEEE Trans. Semiconduct. Manufactur. 24(4), 533\u2013544 (2011). https:\/\/doi.org\/10.1109\/TSM.2011.2163532","journal-title":"IEEE Trans. Semiconduct. Manufactur."},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"Delvaux, J.: Machine-learning attacks on polypufs, ob-pufs, rpufs, lhs-pufs, and puf-fsms. IEEE Trans. Inf. Forens. Secur. 14(8), 2043\u20132058 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2891223","DOI":"10.1109\/TIFS.2019.2891223"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Ebrahimabadi, M., Younis, M., Lalouani, W., Karimi, N.: A novel modeling-attack resilient arbiter-PUF design. In: 2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID), pp. 123\u2013128 (2021). https:\/\/doi.org\/10.1109\/VLSID51830.2021.00026","DOI":"10.1109\/VLSID51830.2021.00026"},{"key":"21_CR11","doi-asserted-by":"publisher","unstructured":"Gao, Y., et al.: Obfuscated challenge-response: a secure lightweight authentication mechanism for PUF-based pervasive devices. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/PERCOMW.2016.7457162","DOI":"10.1109\/PERCOMW.2016.7457162"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Proceedings of 18th Annual Computer Security Applications Conference, 2002, pp. 149\u2013160 (2002). https:\/\/doi.org\/10.1109\/CSAC.2002.1176287","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160. CCS 2002. Association for Computing Machinery, New York, NY, USA (2002). https:\/\/doi.org\/10.1145\/586110.586132","DOI":"10.1145\/586110.586132"},{"key":"21_CR14","doi-asserted-by":"publisher","unstructured":"Halak, B., Zwolinski, M., Mispan, M.S.: Overview of PUF-based hardware security solutions for the Internet of Things. In: 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1\u20134 (2016). https:\/\/doi.org\/10.1109\/MWSCAS.2016.7870046","DOI":"10.1109\/MWSCAS.2016.7870046"},{"issue":"8","key":"21_CR15","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder, C., Yu, M.D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126\u20131141 (2014). https:\/\/doi.org\/10.1109\/JPROC.2014.2320516","journal-title":"Proc. IEEE"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Ikezaki, Y., Nozaki, Y., Yoshikawa, M.: Deep learning attack for physical unclonable function. In: 2016 IEEE 5th Global Conference on Consumer Electronics, pp. 1\u20132 (2016). https:\/\/doi.org\/10.1109\/GCCE.2016.7800478","DOI":"10.1109\/GCCE.2016.7800478"},{"key":"21_CR17","doi-asserted-by":"publisher","unstructured":"Lim, D., Lee, J., Gassend, B., Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 13(10), 1200\u20131205 (2005). https:\/\/doi.org\/10.1109\/TVLSI.2005.859470","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"21_CR18","doi-asserted-by":"publisher","unstructured":"Rajan, A., Sankaran, S.: Lightweight and attack-resilient PUF for Internet of Things. In: 2020 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), pp. 139\u2013142 (2020). https:\/\/doi.org\/10.1109\/iSES50453.2020.00039","DOI":"10.1109\/iSES50453.2020.00039"},{"issue":"1","key":"21_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TETC.2014.2300635","volume":"2","author":"M Rostami","year":"2014","unstructured":"Rostami, M., Majzoobi, M., Koushanfar, F., Wallach, D.S., Devadas, S.: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Trans. Emerg. Top. Comput. 2(1), 37\u201349 (2014). https:\/\/doi.org\/10.1109\/TETC.2014.2300635","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"21_CR20","doi-asserted-by":"publisher","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: 17th ACM Conference on Computer and Communications Security, pp. 237\u2013249. CCS 2010. Association for Computing Machinery, New York, NY, USA (2010). https:\/\/doi.org\/10.1145\/1866307.1866335","DOI":"10.1145\/1866307.1866335"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/978-3-662-44709-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"U R\u00fchrmair","year":"2014","unstructured":"R\u00fchrmair, U., et al.: Efficient power and timing side channels for physical unclonable functions. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 476\u2013492. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_26"},{"issue":"2","key":"21_CR22","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/JETCAS.2021.3075767","volume":"11","author":"N Shah","year":"2021","unstructured":"Shah, N., Chatterjee, D., Sapui, B., Mukhopadhyay, D., Basu, A.: Introducing recurrence in strong PUFS for enhanced machine learning attack resistance. IEEE J. Emerg. Select. Top. Circ. Syst. 11(2), 319\u2013332 (2021). https:\/\/doi.org\/10.1109\/JETCAS.2021.3075767","journal-title":"IEEE J. Emerg. Select. Top. Circ. Syst."},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM\/IEEE Design Automation Conference, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Wang, S.J., Chen, Y.S., Li, K.S.M.: Adversarial attack against modeling attack on PUFS. In: 2019 56th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136 (2019)","DOI":"10.1145\/3316781.3317761"},{"issue":"3","key":"21_CR25","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TMSCS.2016.2553027","volume":"2","author":"MD Yu","year":"2016","unstructured":"Yu, M.D., Hiller, M., Delvaux, J., Sowell, R., Devadas, S., Verbauwhede, I.: A lockdown technique to prevent machine learning on PUFS for lightweight authentication. IEEE Trans. Multi-Scale Comput. Syst. 2(3), 146\u2013159 (2016). https:\/\/doi.org\/10.1109\/TMSCS.2016.2553027","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."},{"key":"21_CR26","unstructured":"Zhuang, Y., Mursi, K.T., Li, G.: A challenge obfuscating interface for arbiter PUF variants against machine learning attacks. CoRR abs\/2103.12935 (2021). https:\/\/arxiv.org\/abs\/2103.12935"}],"container-title":["Communications in Computer and Information Science","VLSI Design and Test"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21514-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T14:40:29Z","timestamp":1671201629000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21514-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031215131","9783031215148"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21514-8_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VDAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on VLSI Design and Test","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jammu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vdat2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iitjammu.ac.in\/vdat2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"220","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}