{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:23:08Z","timestamp":1751095388105,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61532017 61376043 61274030"],"award-info":[{"award-number":["61532017 61376043 61274030"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2989039","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1751-1753","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Jing","family":"Ye","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yu","family":"Hu","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Ruhrmair U. Holcomb D. E. 2014. PUFs at a Glance. Design Automation and Test in Europe (DATE).   Ruhrmair U. Holcomb D. E. 2014. PUFs at a Glance. Design Automation and Test in Europe (DATE).","DOI":"10.7873\/DATE.2014.360"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_29"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_3_2_1_5_1","volume-title":"OPUF: Obfuscation Logic Based Physical Unclonable Function. International On-Line Testing Symposium (IOLTS), 156--161","author":"Ye J.","year":"2015","unstructured":"Ye , J. , Hu , Y. , Li , X. , 2015 . OPUF: Obfuscation Logic Based Physical Unclonable Function. International On-Line Testing Symposium (IOLTS), 156--161 . Ye, J., Hu, Y., Li, X., 2015. OPUF: Obfuscation Logic Based Physical Unclonable Function. International On-Line Testing Symposium (IOLTS), 156--161."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"e_1_3_2_1_7_1","volume-title":"Controlled Physical Random Functions. Computer Security Applications Conference (CSAC), 149--160","author":"Gassend B.","year":"2002","unstructured":"Gassend , B. , Clarke , D. , et. al. , 2002 . Controlled Physical Random Functions. Computer Security Applications Conference (CSAC), 149--160 . Gassend, B., Clarke, D., et. al., 2002. Controlled Physical Random Functions. Computer Security Applications Conference (CSAC), 149--160."},{"key":"e_1_3_2_1_8_1","volume-title":"Lightweight Secure PUFs. International Conference on Computer-Aided Design (ICCAD), 670--673","author":"Majzoobi M.","year":"2008","unstructured":"Majzoobi , M. , Koushanfar , F. , Potkonjak , M. , 2008 . Lightweight Secure PUFs. International Conference on Computer-Aided Design (ICCAD), 670--673 . Majzoobi, M., Koushanfar, F., Potkonjak, M., 2008. Lightweight Secure PUFs. International Conference on Computer-Aided Design (ICCAD), 670--673."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Becker G. T. 2015. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. Cryptographic Hardware and Embedded Systems (CHES) 535--555.  Becker G. T. 2015. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. Cryptographic Hardware and Embedded Systems (CHES) 535--555.","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"e_1_3_2_1_10_1","unstructured":"Becker G. T. Kumar R. 2014. Active and Passive Side-Channel Attacks on Delay Based PUF Designs. IACR Cryptology.  Becker G. T. Kumar R. 2014. Active and Passive Side-Channel Attacks on Delay Based PUF Designs. IACR Cryptology."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813723"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Kumar R. Burleson W. 2014. On Design of a Highly Secure PUF Based on Non-Linear Current Mirrors. Hardware-Oriented Security and Trust (HOST) 38--43.  Kumar R. Burleson W. 2014. On Design of a Highly Secure PUF Based on Non-Linear Current Mirrors. Hardware-Oriented Security and Trust (HOST) 38--43.","DOI":"10.1109\/HST.2014.6855565"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755903"},{"key":"e_1_3_2_1_14_1","unstructured":"ITRS. International Technology Roadmap for Semiconductors. http:\/\/public.itrs.net  ITRS. International Technology Roadmap for Semiconductors. http:\/\/public.itrs.net"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Maiti A. Gunreddy V. Schaumont P. 2013. A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions. IACR Cryptology 245--267  Maiti A. Gunreddy V. Schaumont P. 2013. A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions. IACR Cryptology 245--267","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE Asian Test Symposium (ATS).","author":"Guo Q.","year":"2016","unstructured":"Guo , Q. , Ye , J. , Hu , Y. , Li X. , 2016 . Efficient Attack on Non-Linear Current Mirror PUF with Genetic Algorithm. to be published in Proc . IEEE Asian Test Symposium (ATS). Guo, Q., Ye, J., Hu, Y., Li X., 2016. Efficient Attack on Non-Linear Current Mirror PUF with Genetic Algorithm. to be published in Proc. IEEE Asian Test Symposium (ATS)."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2989039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:54Z","timestamp":1750218594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989039"}},"subtitle":["Attack on Non-Linear Physical Unclonable Function"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":15,"alternative-id":["10.1145\/2976749.2989039","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2989039","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}