{"id":"https://openalex.org/W2782879513","doi":"https://doi.org/10.1109/dft.2017.8244433","title":"Realizing strong PUF from weak PUF via neural computing","display_name":"Realizing strong PUF from weak PUF via neural computing","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2782879513","doi":"https://doi.org/10.1109/dft.2017.8244433","mag":"2782879513"},"language":"en","primary_location":{"id":"doi:10.1109/dft.2017.8244433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft.2017.8244433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063304494","display_name":"Leandro Santiago","orcid":"https://orcid.org/0000-0002-3631-8761"},"institutions":[{"id":"https://openalex.org/I122140584","display_name":"Universidade Federal do Rio de Janeiro","ror":"https://ror.org/03490as77","country_code":"BR","type":"education","lineage":["https://openalex.org/I122140584"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Leandro Santiago","raw_affiliation_strings":["Programa de Engenharia de Sistemas e Computa\u00e7\u00e3o - COPPE, Universidade Federal do Rio de Janeiro (UFRJ), Brazil"],"affiliations":[{"raw_affiliation_string":"Programa de Engenharia de Sistemas e Computa\u00e7\u00e3o - COPPE, Universidade Federal do Rio de Janeiro (UFRJ), Brazil","institution_ids":["https://openalex.org/I122140584"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080028094","display_name":"Vinay C. Patil","orcid":"https://orcid.org/0000-0001-9076-2727"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vinay C. Patil","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103163883","display_name":"Charles B. Prado","orcid":"https://orcid.org/0000-0003-3119-9772"},"institutions":[{"id":"https://openalex.org/I40891861","display_name":"Instituto Nacional de Metrologia, Qualidade e Tecnologia","ror":"https://ror.org/01f8vhd41","country_code":"BR","type":"government","lineage":["https://openalex.org/I2801200668","https://openalex.org/I2802647933","https://openalex.org/I40891861"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Charles B. Prado","raw_affiliation_strings":["Quality and Technology (Inmetro), National Institute of Metrology, Brazil"],"affiliations":[{"raw_affiliation_string":"Quality and Technology (Inmetro), National Institute of Metrology, Brazil","institution_ids":["https://openalex.org/I40891861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109799958","display_name":"Tiago A. O. Alves","orcid":null},"institutions":[{"id":"https://openalex.org/I40034438","display_name":"Universidade do Estado do Rio de Janeiro","ror":"https://ror.org/0198v2949","country_code":"BR","type":"education","lineage":["https://openalex.org/I40034438"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Tiago A. O. Alves","raw_affiliation_strings":["Instituto de Matem\u00e1tica e Estat\u00edstica Uiversidade do Estado do Rio de Janeiro (UERJ), Brazil"],"affiliations":[{"raw_affiliation_string":"Instituto de Matem\u00e1tica e Estat\u00edstica Uiversidade do Estado do Rio de Janeiro (UERJ), Brazil","institution_ids":["https://openalex.org/I40034438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000313725","display_name":"Leandro A. J. Marzulo","orcid":"https://orcid.org/0000-0002-2429-9583"},"institutions":[{"id":"https://openalex.org/I40034438","display_name":"Universidade do Estado do Rio de Janeiro","ror":"https://ror.org/0198v2949","country_code":"BR","type":"education","lineage":["https://openalex.org/I40034438"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Leandro A. J. Marzulo","raw_affiliation_strings":["Instituto de Matem\u00e1tica e Estat\u00edstica Uiversidade do Estado do Rio de Janeiro (UERJ), Brazil"],"affiliations":[{"raw_affiliation_string":"Instituto de Matem\u00e1tica e Estat\u00edstica Uiversidade do Estado do Rio de Janeiro (UERJ), Brazil","institution_ids":["https://openalex.org/I40034438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033447808","display_name":"Felipe M. G. Fran\u00e7a","orcid":"https://orcid.org/0000-0002-8980-6208"},"institutions":[{"id":"https://openalex.org/I122140584","display_name":"Universidade Federal do Rio de Janeiro","ror":"https://ror.org/03490as77","country_code":"BR","type":"education","lineage":["https://openalex.org/I122140584"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Felipe M. G. Franca","raw_affiliation_strings":["Programa de Engenharia de Sistemas e Computa\u00e7\u00e3o - COPPE, Universidade Federal do Rio de Janeiro (UFRJ), Brazil"],"affiliations":[{"raw_affiliation_string":"Programa de Engenharia de Sistemas e Computa\u00e7\u00e3o - COPPE, Universidade Federal do Rio de Janeiro (UFRJ), Brazil","institution_ids":["https://openalex.org/I122140584"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054064879","display_name":"Sandip Kundu","orcid":"https://orcid.org/0000-0001-8221-3824"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sandip Kundu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, USA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5063304494"],"corresponding_institution_ids":["https://openalex.org/I122140584"],"apc_list":null,"apc_paid":null,"fwci":3.4668,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.94321217,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.8280218839645386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7398264408111572},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5884318947792053},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5585221648216248},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5337005257606506},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.47346773743629456},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45767897367477417},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4563577175140381},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4402885437011719},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.43216684460639954},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34363317489624023},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3333514630794525},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3215908706188202},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26875752210617065},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14062607288360596},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11071926355361938}],"concepts":[{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.8280218839645386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7398264408111572},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5884318947792053},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5585221648216248},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5337005257606506},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.47346773743629456},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45767897367477417},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4563577175140381},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4402885437011719},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.43216684460639954},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34363317489624023},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3333514630794525},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3215908706188202},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26875752210617065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14062607288360596},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11071926355361938},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dft.2017.8244433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft.2017.8244433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321091","display_name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","ror":"https://ror.org/00x0ma614"},{"id":"https://openalex.org/F4320322749","display_name":"Funda\u00e7\u00e3o Carlos Chagas Filho de Amparo \u00e0 Pesquisa do Estado do Rio de Janeiro","ror":"https://ror.org/03kk0s825"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W78653260","https://openalex.org/W203309928","https://openalex.org/W1532483809","https://openalex.org/W1606443045","https://openalex.org/W1922829621","https://openalex.org/W1971935236","https://openalex.org/W1975640051","https://openalex.org/W1978567019","https://openalex.org/W1995426156","https://openalex.org/W2027406879","https://openalex.org/W2052828598","https://openalex.org/W2064026638","https://openalex.org/W2080284304","https://openalex.org/W2083471987","https://openalex.org/W2092858172","https://openalex.org/W2113322447","https://openalex.org/W2130351941","https://openalex.org/W2144418895","https://openalex.org/W2146813141","https://openalex.org/W2151759197","https://openalex.org/W2169212403","https://openalex.org/W2248741777","https://openalex.org/W2394928647","https://openalex.org/W2443094676","https://openalex.org/W4236646429","https://openalex.org/W4237236484","https://openalex.org/W4252980856","https://openalex.org/W6603234205","https://openalex.org/W6645104229"],"related_works":["https://openalex.org/W4292862360","https://openalex.org/W2896245892","https://openalex.org/W3083074270","https://openalex.org/W3094096662","https://openalex.org/W2910831494","https://openalex.org/W3081452067","https://openalex.org/W3201860997","https://openalex.org/W2367771963","https://openalex.org/W4280529582","https://openalex.org/W4382936885"],"abstract_inverted_index":{"Physically":[0],"Unclonable":[1],"Functions":[2],"(PUFs)":[3],"are":[4,87],"hardware-based":[5],"security":[6],"primitives":[7],"that":[8,52,140,162],"promise":[9],"to":[10,21,33,58,106,114,170,184],"provide":[11],"an":[12,54,66,90,185],"advantage":[13],"in":[14],"terms":[15],"of":[16,24,69,111,119,128,215,225],"area":[17],"and":[18,64,177,198,223],"power":[19],"compared":[20],"hardware":[22,191],"implementations":[23,86],"standard":[25],"cryptography":[26],"algorithms.":[27],"PUFs":[28,166],"harness":[29],"manufacturing":[30],"process":[31],"variations":[32],"realize":[34,150],"binary":[35,40,50],"keys":[36],"(Weak":[37],"PUFs)":[38],"or":[39,123],"functions":[41],"(SStrong":[42],"PUFs).":[43],"An":[44],"ideal":[45,186],"Strong":[46,84,153,165,187],"PUF":[47,85,113,154],"realizes":[48],"a":[49,59,94,99,112,115,121,126,143,151,156,205],"function":[51],"maps":[53],"m-bit":[55],"input":[56],"challenge":[57],"random":[60],"n-bit":[61],"output":[62,109],"response":[63,110],"offers":[65],"exponential":[67],"number":[68],"such":[70,120,204],"unique":[71],"challenge-response":[72],"pairs":[73],"(CRPs).":[74],"Hence,":[75],"it":[76,104,182],"is":[77,192],"attractive":[78],"for":[79,195,210],"authentication":[80],"applications.":[81],"Unfortunately,":[82],"most":[83],"non-ideal,":[88],"where":[89],"adversary":[91],"can":[92,149],"build":[93],"machine-learning":[95],"model":[96],"by":[97,141],"observing":[98],"relatively":[100],"few":[101],"CRPs,":[102],"making":[103],"possible":[105],"predict":[107],"the":[108,213,216],"future":[116],"challenge.":[117],"Existence":[118],"model,":[122],"clone,":[124],"constitutes":[125],"breach":[127],"security.":[129,211],"In":[130,212],"this":[131],"paper,":[132,217],"we":[133,138,148,160,218],"make":[134],"two":[135],"contributions:":[136],"first,":[137],"demonstrate":[139,161],"leveraging":[142],"Weightless":[144],"Neural":[145,189,226],"Network":[146,227],"(WNN),":[147],"CMOS":[152],"from":[155],"Weak":[157],"PUF.":[158,188],"Next,":[159],"WNN":[163],"based":[164,228],"offer":[167],"robust":[168],"resistance":[169],"machine-learning,":[171],"while":[172],"also":[173],"delivering":[174],"on":[175],"uniqueness":[176],"reliability":[178],"metrics":[179],"-":[180],"bringing":[181],"closer":[183],"network":[190],"gaining":[193],"importance":[194],"pattern":[196],"matching":[197],"classification.":[199],"This":[200],"work":[201],"demonstrates":[202],"how":[203],"design":[206],"may":[207],"be":[208],"re-purposed":[209],"rest":[214],"present":[219],"architecture,":[220],"practical":[221],"implementation":[222],"analysis":[224],"PUFs.":[229]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
