{"id":"https://openalex.org/W3216748537","doi":"https://doi.org/10.1109/nas51552.2021.9605405","title":"Machine Learning-based Vulnerability Study of Interpose PUFs as Security Primitives for IoT Networks","display_name":"Machine Learning-based Vulnerability Study of Interpose PUFs as Security Primitives for IoT Networks","publication_year":2021,"publication_date":"2021-10-01","ids":{"openalex":"https://openalex.org/W3216748537","doi":"https://doi.org/10.1109/nas51552.2021.9605405","mag":"3216748537"},"language":"en","primary_location":{"id":"doi:10.1109/nas51552.2021.9605405","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nas51552.2021.9605405","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Networking, Architecture and Storage (NAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036783104","display_name":"Bipana Thapaliya","orcid":"https://orcid.org/0000-0002-5103-9330"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Bipana Thapaliya","raw_affiliation_strings":["Department of Computer Science, Texas Tech University, Lubbock, Texas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas Tech University, Lubbock, Texas, USA","institution_ids":["https://openalex.org/I12315562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003062703","display_name":"Khalid T. Mursi","orcid":"https://orcid.org/0000-0001-8032-8484"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"Jeddah University","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khalid T. Mursi","raw_affiliation_strings":["Department of Cyber Security, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028690312","display_name":"Yu Zhuang","orcid":"https://orcid.org/0000-0003-2717-1777"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yu Zhuang","raw_affiliation_strings":["Department of Computer Science, Texas Tech University, Lubbock, Texas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas Tech University, Lubbock, Texas, USA","institution_ids":["https://openalex.org/I12315562"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036783104"],"corresponding_institution_ids":["https://openalex.org/I12315562"],"apc_list":null,"apc_paid":null,"fwci":2.0725,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.87456611,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.521999716758728},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4842548072338104},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.45274290442466736},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4366598129272461},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3531309962272644}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.521999716758728},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4842548072338104},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.45274290442466736},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4366598129272461},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3531309962272644}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nas51552.2021.9605405","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nas51552.2021.9605405","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Networking, Architecture and Storage (NAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2080284304","https://openalex.org/W2088455835","https://openalex.org/W2151759197","https://openalex.org/W2289245055","https://openalex.org/W2321234954","https://openalex.org/W2534919326","https://openalex.org/W2765674159","https://openalex.org/W2893712976","https://openalex.org/W2899771611","https://openalex.org/W2953954518","https://openalex.org/W3008113484","https://openalex.org/W3027147428","https://openalex.org/W3092697589","https://openalex.org/W3118819576","https://openalex.org/W4239728551","https://openalex.org/W4249899149","https://openalex.org/W6756040250","https://openalex.org/W6765207028"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Security":[0],"is":[1,91,149],"of":[2,25,92,112,163,176,216],"importance":[3],"for":[4,40,43,53],"communication":[5],"networks,":[6,168],"and":[7,13,36,83,105,169,187,193,224],"many":[8,198],"network":[9],"nodes,":[10],"like":[11],"sensors":[12],"IoT":[14],"devices,":[15],"are":[16],"resource-constrained.":[17],"Physical":[18],"Unclonable":[19],"Functions":[20],"(PUFs)":[21],"leverage":[22],"physical":[23],"variations":[24],"the":[26,38,88,106,110,113,118,146,170,177,194,220,228],"integrated":[27],"circuits":[28,35],"to":[29,33,76,101,117,151],"produce":[30],"responses":[31],"unique":[32],"individual":[34],"have":[37],"potential":[39],"delivering":[41],"security":[42,54,57],"low-cost":[44],"networks.":[45],"But":[46],"before":[47],"a":[48,63,102,120,129,158,213],"PUF":[49,65,69],"can":[50,123],"be":[51,60,77,124],"adopted":[52],"applications,":[55],"all":[56,141],"vulnerabilities":[58],"must":[59],"discovered.":[61],"Recently,":[62],"new":[64,159,209,214],"known":[66,116,142],"as":[67],"Interpose":[68],"(IPUF)":[70],"was":[71,74,182],"proposed,":[72],"which":[73,200],"tested":[75,183],"secure":[78,139,223],"against":[79,140,203],"reliability-based":[80],"modeling":[81,143,160],"attacks":[82,86,144,205],"machine":[84],"learning":[85],"when":[87],"attacked":[89],"IPUF":[90,229],"small":[93],"size.":[94],"A":[95],"recent":[96],"study":[97],"showed":[98,196],"IPUFs":[99,135,164,186,189,199,217],"succumbed":[100],"divide-and-conquer":[103],"attack,":[104],"attack":[107,161,171,181,210],"method":[108,162,172],"requires":[109,173],"position":[111,148],"interpose":[114,131,147,178],"bit":[115],"attacker,":[119],"condition":[121],"that":[122,197],"easily":[125],"obfuscated":[126],"by":[127,218],"using":[128,165],"random":[130],"position.":[132,179],"Thus,":[133],"large":[134],"may":[136],"still":[137],"remain":[138],"if":[145],"unknown":[150],"attackers.":[152],"In":[153],"this":[154],"paper,":[155],"we":[156],"present":[157],"multilayer":[166],"neural":[167],"no":[174],"knowledge":[175],"Our":[180],"on":[184,191],"simulated":[185],"silicon":[188],"implemented":[190],"FPGAs,":[192],"results":[195],"were":[201],"resilient":[202],"existing":[204],"cannot":[206],"withstand":[207],"our":[208],"method,":[211],"revealing":[212],"vulnerability":[215],"re-defining":[219],"boundary":[221],"between":[222],"insecure":[225],"regions":[226],"in":[227],"parameter":[230],"space.":[231]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
