{"id":"https://openalex.org/W3105166662","doi":"https://doi.org/10.1109/dft50435.2020.9250762","title":"A Modelling Attack Resistant Low Overhead Memristive Physical Unclonable Function","display_name":"A Modelling Attack Resistant Low Overhead Memristive Physical Unclonable Function","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3105166662","doi":"https://doi.org/10.1109/dft50435.2020.9250762","mag":"3105166662"},"language":"en","primary_location":{"id":"doi:10.1109/dft50435.2020.9250762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft50435.2020.9250762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://radar.brookes.ac.uk/radar/file/013d00ef-99f2-4239-a904-6f2fcc7d22a2/1/Attack resistant low overhead memristive physical unclonable function - 2020 - Yang Khandelwal Jiang Jabir.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100635998","display_name":"Xiaohan Yang","orcid":"https://orcid.org/0000-0003-4425-4531"},"institutions":[{"id":"https://openalex.org/I124261462","display_name":"Oxford Brookes University","ror":"https://ror.org/04v2twj65","country_code":"GB","type":"education","lineage":["https://openalex.org/I124261462"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Xiaohan Yang","raw_affiliation_strings":["School of ECM, Oxford Brookes University, Oxford, UK"],"affiliations":[{"raw_affiliation_string":"School of ECM, Oxford Brookes University, Oxford, UK","institution_ids":["https://openalex.org/I124261462"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074282193","display_name":"Saurabh Khandelwal","orcid":"https://orcid.org/0000-0001-7992-3390"},"institutions":[{"id":"https://openalex.org/I124261462","display_name":"Oxford Brookes University","ror":"https://ror.org/04v2twj65","country_code":"GB","type":"education","lineage":["https://openalex.org/I124261462"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Saurabh Khandelwal","raw_affiliation_strings":["School of ECM, Oxford Brookes University, Oxford, UK"],"affiliations":[{"raw_affiliation_string":"School of ECM, Oxford Brookes University, Oxford, UK","institution_ids":["https://openalex.org/I124261462"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023484248","display_name":"Aiqi Jiang","orcid":"https://orcid.org/0000-0002-9269-733X"},"institutions":[{"id":"https://openalex.org/I166337079","display_name":"Queen Mary University of London","ror":"https://ror.org/026zzn846","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I166337079"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Aiqi Jiang","raw_affiliation_strings":["School of EECS, Queen Mary University of London, London, UK"],"affiliations":[{"raw_affiliation_string":"School of EECS, Queen Mary University of London, London, UK","institution_ids":["https://openalex.org/I166337079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076588539","display_name":"Abusaleh Jabir","orcid":null},"institutions":[{"id":"https://openalex.org/I124261462","display_name":"Oxford Brookes University","ror":"https://ror.org/04v2twj65","country_code":"GB","type":"education","lineage":["https://openalex.org/I124261462"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Abusaleh Jabir","raw_affiliation_strings":["School of ECM, Oxford Brookes University, Oxford, UK"],"affiliations":[{"raw_affiliation_string":"School of ECM, Oxford Brookes University, Oxford, UK","institution_ids":["https://openalex.org/I124261462"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100635998"],"corresponding_institution_ids":["https://openalex.org/I124261462"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16695703,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"46","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.8760501742362976},{"id":"https://openalex.org/keywords/memristor","display_name":"Memristor","score":0.7212077379226685},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7113715410232544},{"id":"https://openalex.org/keywords/neuromorphic-engineering","display_name":"Neuromorphic engineering","score":0.6480038166046143},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5418196320533752},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5228731632232666},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5153200030326843},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.510466456413269},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.49799132347106934},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.44226551055908203},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4349241256713867},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39502888917922974},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3530658781528473},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.32831069827079773},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3255377411842346},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.314727246761322},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23945578932762146},{"id":"https://openalex.org/keywords/arbiter","display_name":"Arbiter","score":0.2171943187713623},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21143224835395813},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14795580506324768}],"concepts":[{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.8760501742362976},{"id":"https://openalex.org/C150072547","wikidata":"https://www.wikidata.org/wiki/Q212923","display_name":"Memristor","level":2,"score":0.7212077379226685},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7113715410232544},{"id":"https://openalex.org/C151927369","wikidata":"https://www.wikidata.org/wiki/Q1981312","display_name":"Neuromorphic engineering","level":3,"score":0.6480038166046143},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5418196320533752},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5228731632232666},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5153200030326843},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.510466456413269},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.49799132347106934},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.44226551055908203},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4349241256713867},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39502888917922974},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3530658781528473},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.32831069827079773},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3255377411842346},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.314727246761322},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23945578932762146},{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.2171943187713623},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21143224835395813},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14795580506324768},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/dft50435.2020.9250762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft50435.2020.9250762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"},{"id":"pmh:tle:013d00ef-99f2-4239-a904-6f2fcc7d22a2:afee126f-04b2-41a9-a6dd-b29b7c6c20ab:1","is_oa":true,"landing_page_url":"https://radar.brookes.ac.uk/radar/items/013d00ef-99f2-4239-a904-6f2fcc7d22a2/1/","pdf_url":"https://radar.brookes.ac.uk/radar/file/013d00ef-99f2-4239-a904-6f2fcc7d22a2/1/Attack resistant low overhead memristive physical unclonable function - 2020 - Yang Khandelwal Jiang Jabir.pdf","source":{"id":"https://openalex.org/S4306400541","display_name":"Radar (Oxford Brookes University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I124261462","host_organization_name":"Oxford Brookes University","host_organization_lineage":["https://openalex.org/I124261462"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"A modelling attack resistant low overhead memristive physical unclonable function","raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:tle:013d00ef-99f2-4239-a904-6f2fcc7d22a2:afee126f-04b2-41a9-a6dd-b29b7c6c20ab:1","is_oa":true,"landing_page_url":"https://radar.brookes.ac.uk/radar/items/013d00ef-99f2-4239-a904-6f2fcc7d22a2/1/","pdf_url":"https://radar.brookes.ac.uk/radar/file/013d00ef-99f2-4239-a904-6f2fcc7d22a2/1/Attack resistant low overhead memristive physical unclonable function - 2020 - Yang Khandelwal Jiang Jabir.pdf","source":{"id":"https://openalex.org/S4306400541","display_name":"Radar (Oxford Brookes University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I124261462","host_organization_name":"Oxford Brookes University","host_organization_lineage":["https://openalex.org/I124261462"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"A modelling attack resistant low overhead memristive physical unclonable function","raw_type":"conference paper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W3105166662.pdf"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W42037993","https://openalex.org/W401002857","https://openalex.org/W1578783943","https://openalex.org/W2006412300","https://openalex.org/W2054637470","https://openalex.org/W2061983145","https://openalex.org/W2075660468","https://openalex.org/W2092858172","https://openalex.org/W2116374153","https://openalex.org/W2791172426","https://openalex.org/W2978421645","https://openalex.org/W3118065077","https://openalex.org/W3151293064","https://openalex.org/W4231232484","https://openalex.org/W4236646429","https://openalex.org/W4285719527","https://openalex.org/W6676995458"],"related_works":["https://openalex.org/W1872623660","https://openalex.org/W3207218810","https://openalex.org/W4292697011","https://openalex.org/W3212508523","https://openalex.org/W1995352804","https://openalex.org/W2909534142","https://openalex.org/W2086672837","https://openalex.org/W4367187682","https://openalex.org/W1940420793","https://openalex.org/W3215957123"],"abstract_inverted_index":{"Memristors":[0],"are":[1],"finding":[2],"applications":[3],"in":[4,35,49,77],"memory,":[5],"logic,":[6],"neuromorphic":[7],"systems,":[8],"and":[9,53,63,139],"data":[10],"security.":[11],"To":[12,91],"this":[13,47],"end,":[14],"we":[15,95],"leverage":[16],"the":[17,44,87,97,124],"non-linear":[18,39],"behaviour":[19],"of":[20,46,74,89],"memristors":[21],"to":[22,99,131],"devise":[23],"a":[24,31,38,68,72],"low":[25],"overhead":[26],"physical":[27,56],"unclonable":[28],"function":[29],"using":[30],"memristive":[32,40],"chaos":[33],"circuit":[34],"conjunction":[36],"with":[37,67,81],"encoder.":[41],"We":[42,120],"demonstrate":[43,92],"effectiveness":[45],"architecture":[48,59,98,127],"Challenge-Response-Pair":[50],"based":[51,102],"authentication,":[52],"for":[54,85,135],"its":[55,82,93],"uncloneability.":[57],"This":[58],"is":[60],"highly":[61],"versatile":[62],"can":[64],"be":[65],"implemented":[66],"single":[69],"encoder":[70],"or":[71],"number":[73],"encoders":[75],"running":[76],"parallel,":[78],"each":[79],"one":[80],"own":[83],"merit,":[84],"extending":[86],"sizes":[88,138],"CRPs.":[90],"effectiveness,":[94],"subject":[96],"machine":[100],"learning":[101],"modelling":[103],"attacks":[104],"e.g.":[105],"Logistic":[106],"Regression,":[107],"Support":[108],"Vector":[109],"Machines,":[110],"Random":[111],"Forest,":[112],"as":[113,115],"well":[114],"Artificial":[116],"Neural":[117],"Network":[118],"classifiers.":[119],"found":[121],"out":[122],"that":[123],"proposed":[125],"PUF":[126],"provides":[128],"better":[129],"resistance":[130],"such":[132],"attacks,":[133],"even":[134],"smaller":[136],"bit":[137],"at":[140],"reduced":[141],"overheads.":[142]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-11-23T00:00:00"}
