{"id":"https://openalex.org/W7128623812","doi":"https://doi.org/10.1109/asianhost68425.2025.11370351","title":"Evaluating Proposed Countermeasures for Power Analysis of Ring Oscillator PUFs","display_name":"Evaluating Proposed Countermeasures for Power Analysis of Ring Oscillator PUFs","publication_year":2025,"publication_date":"2025-12-19","ids":{"openalex":"https://openalex.org/W7128623812","doi":"https://doi.org/10.1109/asianhost68425.2025.11370351"},"language":"en","primary_location":{"id":"doi:10.1109/asianhost68425.2025.11370351","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost68425.2025.11370351","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.qub.ac.uk/en/publications/a246c658-e266-4344-83c2-e1abe449145c","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110161067","display_name":"J. MOORE","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"James Moore","raw_affiliation_strings":["CSIT Queen&#x2019;s University Belfast,The Centre for Secure Information Technologies,Belfast,U.K"],"affiliations":[{"raw_affiliation_string":"CSIT Queen&#x2019;s University Belfast,The Centre for Secure Information Technologies,Belfast,U.K","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045440843","display_name":"Jack Miskelly","orcid":"https://orcid.org/0000-0001-8063-4019"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jack Miskelly","raw_affiliation_strings":["CSIT Queen&#x2019;s University Belfast,The Centre for Secure Information Technologies,Belfast,U.K"],"affiliations":[{"raw_affiliation_string":"CSIT Queen&#x2019;s University Belfast,The Centre for Secure Information Technologies,Belfast,U.K","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044643181","display_name":"Maire O\u2019Neill","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"M\u00e1ire O\u2019Neill","raw_affiliation_strings":["CSIT Queen&#x2019;s University Belfast,The Centre for Secure Information Technologies,Belfast,U.K"],"affiliations":[{"raw_affiliation_string":"CSIT Queen&#x2019;s University Belfast,The Centre for Secure Information Technologies,Belfast,U.K","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123018461","display_name":"C. Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chongyan Gu","raw_affiliation_strings":["CSIT Queen&#x2019;s University Belfast,The Centre for Secure Information Technologies,Belfast,U.K"],"affiliations":[{"raw_affiliation_string":"CSIT Queen&#x2019;s University Belfast,The Centre for Secure Information Technologies,Belfast,U.K","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110161067"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79740784,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.031199999153614044,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7756999731063843},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.6687999963760376},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6108999848365784},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5126000046730042},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.42489999532699585},{"id":"https://openalex.org/keywords/ring-oscillator","display_name":"Ring oscillator","score":0.3409999907016754},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33160001039505005},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3257000148296356}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7756999731063843},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.6687999963760376},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6108999848365784},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5126000046730042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49709999561309814},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.42489999532699585},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.39649999141693115},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.39239999651908875},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3804999887943268},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3610000014305115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3571999967098236},{"id":"https://openalex.org/C104111718","wikidata":"https://www.wikidata.org/wiki/Q2153973","display_name":"Ring oscillator","level":3,"score":0.3409999907016754},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33160001039505005},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.30970001220703125},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C63361517","wikidata":"https://www.wikidata.org/wiki/Q5645805","display_name":"Hamming weight","level":5,"score":0.28189998865127563},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2727000117301941},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.2651999890804291},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C2987719587","wikidata":"https://www.wikidata.org/wiki/Q1811428","display_name":"Leakage power","level":4,"score":0.26420000195503235}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/asianhost68425.2025.11370351","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost68425.2025.11370351","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/a246c658-e266-4344-83c2-e1abe449145c","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/a246c658-e266-4344-83c2-e1abe449145c","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Moore, J, Miskelly, J, O'Neill, M & Gu, C 2026, Evaluating proposed countermeasures for power analysis of ring oscillator PUFs. in 2025 Asian Hardware Oriented Security and Trust Symposium (AsianHOST): Proceedings. IEEE, IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Nanjing, China, 19/12/2025. https://doi.org/10.1109/AsianHOST68425.2025.11370351","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/a246c658-e266-4344-83c2-e1abe449145c","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/a246c658-e266-4344-83c2-e1abe449145c","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Moore, J, Miskelly, J, O'Neill, M & Gu, C 2026, Evaluating proposed countermeasures for power analysis of ring oscillator PUFs. in 2025 Asian Hardware Oriented Security and Trust Symposium (AsianHOST): Proceedings. IEEE, IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Nanjing, China, 19/12/2025. https://doi.org/10.1109/AsianHOST68425.2025.11370351","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"score":0.5215855836868286,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"security":[1,18],"of":[2,53,67,92],"PUF":[3,45],"derived":[4],"secrets":[5],"against":[6],"common":[7],"analysis":[8],"techniques":[9],"is":[10,26],"integral":[11],"to":[12,73,84],"their":[13],"use":[14],"as":[15],"a":[16,58,114],"hardware":[17],"primitive.":[19],"As":[20],"in":[21,41,51,109],"any":[22],"secure":[23,118],"element,":[24],"it":[25],"essential":[27],"that":[28,33,102],"designers":[29],"understand":[30],"the":[31,89],"impact":[32],"design":[34,119],"choices":[35],"can":[36],"have":[37,47],"on":[38],"information":[39],"leakage":[40,70],"various":[42],"domains.":[43],"While":[44],"designs":[46],"been":[48,63],"well":[49],"studied":[50],"terms":[52],"machine":[54],"learning":[55],"attacks":[56,87],"from":[57],"remote":[59],"adversary,":[60],"there":[61],"has":[62],"much":[64],"less":[65],"investigation":[66],"side":[68],"channel":[69],"and":[71,88],"how":[72],"mitigate":[74],"it.":[75],"In":[76],"this":[77],"paper":[78],"we":[79,100],"investigate":[80],"different":[81],"proposed":[82],"countermeasures":[83],"prevent":[85],"such":[86],"actual":[90],"degree":[91],"protection":[93],"provided":[94],"by":[95],"each.":[96],"From":[97],"these":[98],"results,":[99],"show":[101],"only":[103],"one":[104],"approach":[105],"(parallel":[106],"comparison)":[107],"results":[108],"robust":[110],"protection.":[111],"This":[112],"provides":[113],"valuable":[115],"insight":[116],"into":[117],"principles":[120],"for":[121],"all":[122],"RO-based":[123],"PUFs.":[124]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2026-02-12T00:00:00"}
