{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:50:32Z","timestamp":1774630232917,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/vts.2018.8368627","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T18:16:52Z","timestamp":1527790612000},"page":"1-6","source":"Crossref","is-referenced-by-count":22,"title":["Modeling attacks on strong physical unclonable functions strengthened by random number and weak PUF"],"prefix":"10.1109","author":[{"given":"Jing","family":"Ye","sequence":"first","affiliation":[]},{"given":"Qingli","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Huawei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2017.8046200"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"ref10","first-page":"1200","article-title":"Extracting Secret Keys from Integrated Circuits","volume":"13","author":"lim","year":"2005","journal-title":"IEEE TVLSI"},{"key":"ref11","article-title":"Modeling Attacks on Phyiscal Unclonable Functions","author":"ruhrmair","year":"2010","journal-title":"CCS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref13","first-page":"653","author":"vijayakumar","year":"2015","journal-title":"A Novel Modeling Attack Resistant PUF Design based on Non-Linear Voltage Transfer Characteristics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855565"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495550"},{"key":"ref16","first-page":"49","author":"guo","year":"2016","journal-title":"Efficient Attack on Non-Linear Current Mirror PUF with Genetic Algorithm"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989039"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813723"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2427259"},{"key":"ref4","first-page":"188","article-title":"Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations","author":"prabhu","year":"2011","journal-title":"ICTTC"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2015.7229850"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7168907"},{"key":"ref6","author":"koeberl","year":"2013","journal-title":"Memristor PUFs A New Generation of Memory based Physical Unclonable Functions"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593072"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2013.2282114"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"ref7","article-title":"Cloning Physical Unclonable Function","author":"helfmeier","year":"2013","journal-title":"Host"},{"key":"ref2","first-page":"63","article-title":"FPGA Intrinsic PUFs and Their Use for IP Protection","author":"guajardo","year":"2007","journal-title":"CHES"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.68"},{"key":"ref1","author":"ruhrmair","year":"2014","journal-title":"PUFs at A Glance"},{"key":"ref20","article-title":"Active and Passive Side-Channel Attacks on Delay Based PUF Designs","author":"becker","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref22","first-page":"535","volume":"9293","author":"becker","year":"2015","journal-title":"The Gap Between Promise and Reality On the Insecurity of XOR Arbiter PUFs"},{"key":"ref21","article-title":"Combined Modeling and Side Channel Attacks on Strong PUFs","author":"mahmoud","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref24","article-title":"Robust and Reverse-Engineering Resilient PUF Authentication and Keyexchange by Substring Matching","author":"rostami","year":"2014","journal-title":"IEEE TETC"},{"key":"ref23","first-page":"33","author":"majzoobi","year":"2012","journal-title":"Slender PUF Protocol A Lightweight Robust and Secure Authentication by Substring Matching"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835567"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855582"}],"event":{"name":"2018 IEEE 36th VLSI Test Symposium (VTS)","location":"San Francisco, CA","start":{"date-parts":[[2018,4,22]]},"end":{"date-parts":[[2018,4,25]]}},"container-title":["2018 IEEE 36th VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8362837\/8368610\/08368627.pdf?arnumber=8368627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T23:41:22Z","timestamp":1643154082000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8368627\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/vts.2018.8368627","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}