{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:27:51Z","timestamp":1777566471948,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T00:00:00Z","timestamp":1286150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,4]]},"DOI":"10.1145\/1866307.1866335","type":"proceedings-article","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T14:38:23Z","timestamp":1286289503000},"page":"237-249","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":545,"title":["Modeling attacks on physical unclonable functions"],"prefix":"10.1145","author":[{"given":"Ulrich","family":"R\u00fchrmair","sequence":"first","affiliation":[{"name":"TU M\u00fcnchen, 80333 M\u00fcnchen, Germany"}]},{"given":"Frank","family":"Sehnke","sequence":"additional","affiliation":[{"name":"TU M\u00fcnchen, 80333 M\u00fcnchen, Germany"}]},{"given":"Jan","family":"S\u00f6lter","sequence":"additional","affiliation":[{"name":"TU M\u00fcnchen, 80333 M\u00fcnchen, Germany"}]},{"given":"Gideon","family":"Dror","sequence":"additional","affiliation":[{"name":"The Academic College of Tel Aviv - Jaffa, Tel Aviv, 61083 , Israel"}]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"J\u00fcrgen","family":"Schmidhuber","sequence":"additional","affiliation":[{"name":"TU M\u00fcnchen, 80333 M\u00fcnchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2010,10,4]]},"reference":[{"issue":"5589","key":"e_1_3_2_1_1_1","first-page":"2002","article-title":"Physical one-way functions","volume":"297","author":"Pappu R.","year":"2026","unstructured":"}} R. Pappu , B. Recht , J. Taylor , and N. Gershenfeld . Physical one-way functions . Science , 297 ( 5589 ): 2026 , 2002 . }}R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical one-way functions. Science, 297(5589):2026, 2002.","journal-title":"Science"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784802"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_3_2_1_6_1","volume-title":"MIT","author":"Pappu R.","year":"2001","unstructured":"}} R. Pappu . Physical One-Way Functions. Phd thesis , MIT , 2001 . }}R. Pappu. Physical One-Way Functions. Phd thesis, MIT, 2001."},{"key":"e_1_3_2_1_7_1","volume-title":"Security, Privacy and Trust in Modern Data Management","author":"Tuyls P.","year":"2007","unstructured":"}} P. Tuyls and B. Skoric . Strong Authentication with PUFs . In: Security, Privacy and Trust in Modern Data Management , M. Petkovic, W. Jonker (Eds.), Springer , 2007 . }}P. Tuyls and B. Skoric. Strong Authentication with PUFs. In: Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (Eds.), Springer, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"}}\n      Ulrich R\n      \u00fchrmair\n    .\n  Oblivious transfer based on physical unclonable functions (extended abstract)\n  . In Alessandro Acquisti Sean W. Smith and Ahmad-Reza Sadeghi editors TRUST volume \n  6101\n   of \n  Lecture Notes in Computer Science pages \n  430\n  --\n  440\n  . \n  Springer 2010\n  .   }}Ulrich R \u00fchrmair. Oblivious transfer based on physical unclonable functions (extended abstract). In Alessandro Acquisti Sean W. Smith and Ahmad-Reza Sadeghi editors TRUST volume 6101 of Lecture Notes in Computer Science pages 430--440. Springer 2010.","DOI":"10.1007\/978-3-642-13869-0_31"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1509456.1509603"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v16:11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"e_1_3_2_1_14_1","volume-title":"In Proceedings of the Conference on RFID Security","author":"Holcomb Daniel E.","year":"2007","unstructured":"}} Daniel E. Holcomb , Wayne P. Burleson , and Kevin Fu . Initial sram state as a fingerprint and source of true random numbers for rfid tags . In In Proceedings of the Conference on RFID Security , 2007 . }}Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu. Initial sram state as a fingerprint and source of true random numbers for rfid tags. In In Proceedings of the Conference on RFID Security, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_29"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.54"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2008.4700636"},{"key":"e_1_3_2_1_21_1","volume-title":"Pattern recognition and machine learning","author":"Bishop C.M.","year":"2006","unstructured":"}} C.M. Bishop Pattern recognition and machine learning . Springer New York :, 2006 . }}C.M. Bishop et al. Pattern recognition and machine learning. Springer New York:, 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298623"},{"key":"e_1_3_2_1_23_1","unstructured":"}}http:\/\/www.pcp.in.tum.de\/code\/lr.zip 2010.  }}http:\/\/www.pcp.in.tum.de\/code\/lr.zip 2010."},{"key":"e_1_3_2_1_24_1","volume-title":"Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms","author":"\u00e4ck T. B","year":"1996","unstructured":"}} T. B \u00e4ck . Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms . Oxford University Press , USA , 1996 . }}T. B \u00e4ck. Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms. Oxford University Press, USA, 1996."},{"key":"e_1_3_2_1_25_1","volume-title":"Evolution and Optimum Seeking: The Sixth Generation","author":"Schwefel H.P.P.","year":"1993","unstructured":"}} H.P.P. Schwefel . Evolution and Optimum Seeking: The Sixth Generation . John Wiley & Sons, Inc. New York, NY, USA , 1993 . }}H.P.P. Schwefel. Evolution and Optimum Seeking: The Sixth Generation. John Wiley & Sons, Inc. New York, NY, USA, 1993."},{"key":"e_1_3_2_1_26_1","first-page":"999","volume":"1","author":"Schaul T.","year":"2010","unstructured":"}} T. Schaul , J. Bayer , D. Wierstra , Y. Sun , M. Felder , F. Sehnke , T. R \u00fcckstie \u00df, and J. Schmidhuber . PyBrain. Journal of Machine Learning Research , 1 : 999 -- 1000 , 2010 . }}T. Schaul, J. Bayer, D. Wierstra, Y. Sun, M. Felder, F. Sehnke, T. R \u00fcckstie \u00df, and J. Schmidhuber. PyBrain. Journal of Machine Learning Research, 1:999--1000, 2010.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_27_1","volume-title":"John Wiley and Sons Ltd.","author":"Papadimitriou C.H.","year":"2003","unstructured":"}} C.H. Papadimitriou . Computational complexity . John Wiley and Sons Ltd. , 2003 . }}C.H. Papadimitriou. Computational complexity. John Wiley and Sons Ltd., 2003."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNNA.2010.5430303"},{"key":"e_1_3_2_1_30_1","article-title":"Applications of high-capacity crossbar memories in cryptography. To appear","author":"\u00fchrmair U. R","year":"2010","unstructured":"}} U. R \u00fchrmair , C. Jaeger , M. Bator , M. Stutzmann , P. Lugli , and G. Csaba . Applications of high-capacity crossbar memories in cryptography. To appear in IEEE Transactions on Nanotechnology , 2010 . }}U. R \u00fchrmair, C. Jaeger, M. Bator, M. Stutzmann, P. Lugli, and G. Csaba. Applications of high-capacity crossbar memories in cryptography. To appear in IEEE Transactions on Nanotechnology, 2010.","journal-title":"IEEE Transactions on Nanotechnology"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163571.2163597"},{"issue":"172103","key":"e_1_3_2_1_32_1","article-title":"Random p-n-junctions for physical cryptography","volume":"96","author":"Jaeger C.","year":"2010","unstructured":"}} C. Jaeger , M. Algasinger , U. R \u00fchrmair , G. Csaba , and M. Stutzmann . Random p-n-junctions for physical cryptography . Applied Physics Letters , 96 ( 172103 ), 2010 . }}C. Jaeger, M. Algasinger, U. R \u00fchrmair, G. Csaba, and M. Stutzmann. Random p-n-junctions for physical cryptography. Applied Physics Letters, 96(172103), 2010.","journal-title":"Applied Physics Letters"}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","location":"Chicago Illinois USA","acronym":"CCS '10","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 17th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866307.1866335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:09:07Z","timestamp":1750248547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,4]]},"references-count":29,"alternative-id":["10.1145\/1866307.1866335","10.1145\/1866307"],"URL":"https:\/\/doi.org\/10.1145\/1866307.1866335","relation":{},"subject":[],"published":{"date-parts":[[2010,10,4]]},"assertion":[{"value":"2010-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}