{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T18:08:44Z","timestamp":1762625324228,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031708787"},{"type":"electronic","value":"9783031708794"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70879-4_13","type":"book-chapter","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:02:20Z","timestamp":1725476540000},"page":"251-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Optimal Machine-Learning Attacks on\u00a0Hybrid PUFs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9113-9398","authenticated-orcid":false,"given":"Fei","family":"Hongming","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5636-8726","authenticated-orcid":false,"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7250-8271","authenticated-orcid":false,"given":"Owen","family":"Millwood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0084-4647","authenticated-orcid":false,"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1109\/TIFS.2020.2968113","volume":"15","author":"SS Avvaru","year":"2020","unstructured":"Avvaru, S.S., Zeng, Z., Parhi, K.K.: Homogeneous and heterogeneous feed-forward xor physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 15, 2485\u20132498 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-662-48324-4_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"GT Becker","year":"2015","unstructured":"Becker, G.T.: The gap between promise and reality: on the insecurity of XOR Arbiter PUFs. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 535\u2013555. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_27"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Verbauwhede, I.: Side channel modeling attacks on 65nm arbiter pufs exploiting cmos device noise. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 137\u2013142. IEEE (2013)","DOI":"10.1109\/HST.2013.6581579"},{"issue":"120","key":"13_CR4","first-page":"1","volume":"23","author":"W Fedus","year":"2022","unstructured":"Fedus, W., Zoph, B., Shazeer, N.: Switch transformers: scaling to trillion parameter models with simple and efficient sparsity. J. Mach. Learn. Res. 23(120), 1\u201339 (2022)","journal-title":"J. Mach. Learn. Res."},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s13389-016-0119-4","volume":"6","author":"F Ganji","year":"2016","unstructured":"Ganji, F., Tajik, S., Seifert, J.P.: Pac learning of arbiter pufs. J. Cryptogr. Eng. 6, 249\u2013258 (2016)","journal-title":"J. Cryptogr. Eng."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Golanbari, M.S., Kiamehr, S., Bishnoi, R., Tahoori, M.B.: Reliable memory puf design for low-power applications. In: 2018 19th International Symposium on Quality Electronic Design (ISQED), pp. 207\u2013213. IEEE (2018)","DOI":"10.1109\/ISQED.2018.8357289"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Guilmeau, T., Chouzenoux, E., Elvira, V.: Simulated annealing: a review and a new scheme. In: 2021 IEEE Statistical Signal Processing Workshop (SSP), pp. 101\u2013105. IEEE (2021)","DOI":"10.1109\/SSP49050.2021.9513782"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"He, Z., Wan, M., Deng, J., Bai, C., Dai, K.: A reliable strong puf based on switched-capacitor circuit. IEEE Trans. Very Large Scale Integration (VLSI) Systems 26(6), 1073\u20131083 (2018)","DOI":"10.1109\/TVLSI.2018.2806041"},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s13389-020-00223-w","volume":"10","author":"M Hiller","year":"2020","unstructured":"Hiller, M., K\u00fcrzinger, L., Sigl, G.: Review of error correction for pufs and evaluation on state-of-the-art fpgas. J. Cryptogr. Eng. 10(3), 229\u2013247 (2020)","journal-title":"J. Cryptogr. Eng."},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Khalafalla, M., Gebotys, C.: Pufs deep attacks: enhanced modeling attacks using deep learning techniques to break the security of double arbiter pufs. In: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 204\u2013209 (2019). https:\/\/doi.org\/10.23919\/DATE.2019.8714862","DOI":"10.23919\/DATE.2019.8714862"},{"key":"13_CR11","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-35289-8_3","volume-title":"Neural Networks: Tricks of the Trade","author":"YA LeCun","year":"2012","unstructured":"LeCun, Y.A., Bottou, L., Orr, G.B., M\u00fcller, K.-R.: Efficient BackProp. In: Montavon, G., Orr, G.B., M\u00fcller, K.-R. (eds.) Neural Networks: Tricks of the Trade. LNCS, vol. 7700, pp. 9\u201348. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35289-8_3"},{"key":"13_CR13","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., Van\u00a0Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 04CH37525), pp. 176\u2013179. IEEE (2004)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., Van\u00a0Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integration (VLSI) Syst. 13(10), 1200\u20131205 (2005)","DOI":"10.1109\/TVLSI.2005.859470"},{"issue":"1","key":"13_CR15","doi-asserted-by":"publisher","first-page":"501","DOI":"10.46586\/tches.v2024.i1.501-526","volume":"2024","author":"N Mishra","year":"2024","unstructured":"Mishra, N., Pratihar, K., Mandal, S., Chakraborty, A., R\u00fchrmair, U., Mukhopadhyay, D.: Calypso: An enhanced search optimization based framework to model delay-based pufs. IACR Trans. Cryptographic Hardware Embedded Syst. 2024(1), 501\u2013526 (2024)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"issue":"10","key":"13_CR16","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.3390\/electronics9101715","volume":"9","author":"KT Mursi","year":"2020","unstructured":"Mursi, K.T., Thapaliya, B., Zhuang, Y., Aseeri, A.O., Alkatheiri, M.S.: A fast deep learning method for security vulnerability study of xor pufs. Electronics 9(10), 1715 (2020)","journal-title":"Electronics"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, P.H., Sahoo, D.P., Jin, C., Mahmood, K., R\u00fchrmair, U., Van\u00a0Dijk, M.: The interpose puf: Secure puf design against state-of-the-art machine learning attacks. Cryptology ePrint Archive (2018)","DOI":"10.46586\/tches.v2019.i4.243-290"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237\u2013249 (2010)","DOI":"10.1145\/1866307.1866335"},{"issue":"3","key":"13_CR19","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TC.2017.2749226","volume":"67","author":"DP Sahoo","year":"2017","unstructured":"Sahoo, D.P., Mukhopadhyay, D., Chakraborty, R.S., Nguyen, P.H.: A multiplexer-based arbiter puf composition with enhanced reliability and security. IEEE Trans. Comput. 67(3), 403\u2013417 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"13_CR20","unstructured":"Santikellur, P., Bhattacharyay, A., Chakraborty, R.S.: Deep learning based model building attacks on arbiter puf compositions. Cryptology ePrint Archive (2019)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Santikellur, P., Prakash, S.R., Chakraborty, R.S., et\u00a0al.: A computationally efficient tensor regression network based modeling attack on xor apuf. In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/AsianHOST47458.2019.9006692"},{"issue":"10","key":"13_CR22","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1109\/TCAD.2019.2962115","volume":"39","author":"J Shi","year":"2019","unstructured":"Shi, J., Lu, Y., Zhang, J.: Approximation attacks on strong pufs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10), 2138\u20132151 (2019)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual Design Automation Conference, pp. 9\u201314 (2007)","DOI":"10.1145\/1278480.1278484"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Wang, S., Li, Y., Li, H., Zhu, T., Li, Z., Ou, W.: Multi-task learning with calibrated mixture of insightful experts. In: 2022 IEEE 38th International Conference on Data Engineering (ICDE), pp. 3307\u20133319. IEEE (2022)","DOI":"10.1109\/ICDE53745.2022.00312"},{"issue":"4","key":"13_CR25","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TIFS.2017.2774761","volume":"13","author":"WC Wang","year":"2017","unstructured":"Wang, W.C., Yona, Y., Diggavi, S.N., Gupta, P.: Design and analysis of stability-guaranteed pufs. IEEE Trans. Inf. Forensics Secur. 13(4), 978\u2013992 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Wisiol, N., Met al.: Splitting the interpose puf: A novel modeling attack strategy. IACR Trans. Cryptographic Hardware Embedded Syst. 97\u2013120 (2020)","DOI":"10.46586\/tches.v2020.i3.97-120"},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"2719","DOI":"10.1109\/TIFS.2022.3189533","volume":"17","author":"N Wisiol","year":"2022","unstructured":"Wisiol, N., Thapaliya, B., Mursi, K.T., Seifert, J.P., Zhuang, Y.: Neural network modeling attacks on arbiter-puf-based designs. IEEE Trans. Inf. Forensics Secur. 17, 2719\u20132731 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"13_CR28","first-page":"662","volume":"10","author":"J Ya","year":"2022","unstructured":"Ya, J., et al.: Design and evaluate recomposited or-and-xor-puf. IEEE Trans. Emerg. Top. Comput. 10(2), 662\u2013677 (2022)","journal-title":"IEEE Trans. Emerg. Top. Comput."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70879-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:05:06Z","timestamp":1725476706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70879-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031708787","9783031708794"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70879-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}