{"id":"https://openalex.org/W4226047535","doi":"https://doi.org/10.1109/tifs.2022.3152393","title":"Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs","display_name":"Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4226047535","doi":"https://doi.org/10.1109/tifs.2022.3152393"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3152393","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3152393","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024036424","display_name":"Wei Liu","orcid":"https://orcid.org/0000-0001-7281-1206"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wei Liu","raw_affiliation_strings":["State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103118772","display_name":"Ruimin Wang","orcid":"https://orcid.org/0000-0001-8899-2478"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ruiming Wang","raw_affiliation_strings":["State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050489523","display_name":"Xuyan Qi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuyan Qi","raw_affiliation_strings":["State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087237805","display_name":"Liehui Jiang","orcid":"https://orcid.org/0000-0001-8554-7694"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liehui Jiang","raw_affiliation_strings":["State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073991792","display_name":"Jing Jing","orcid":"https://orcid.org/0000-0002-1160-6919"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jing Jing","raw_affiliation_strings":["State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5024036424"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.7965,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90463265,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"924","last_page":"937"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8197064399719238},{"id":"https://openalex.org/keywords/softmax-function","display_name":"Softmax function","score":0.6609060764312744},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6265928745269775},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5358961820602417},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5342323780059814},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4525439739227295},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.44518089294433594},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35200750827789307},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34489065408706665},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2805189788341522}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8197064399719238},{"id":"https://openalex.org/C188441871","wikidata":"https://www.wikidata.org/wiki/Q7554146","display_name":"Softmax function","level":3,"score":0.6609060764312744},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6265928745269775},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5358961820602417},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5342323780059814},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4525439739227295},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44518089294433594},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35200750827789307},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34489065408706665},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2805189788341522},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3152393","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3152393","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5480395480","display_name":null,"funder_award_id":"61802431","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7061162874","display_name":null,"funder_award_id":"61871405","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W338742241","https://openalex.org/W1533568595","https://openalex.org/W2014299685","https://openalex.org/W2014457808","https://openalex.org/W2041435997","https://openalex.org/W2044389004","https://openalex.org/W2080284304","https://openalex.org/W2088455835","https://openalex.org/W2094192676","https://openalex.org/W2123482651","https://openalex.org/W2151759197","https://openalex.org/W2265382507","https://openalex.org/W2289245055","https://openalex.org/W2321234954","https://openalex.org/W2337867785","https://openalex.org/W2341260337","https://openalex.org/W2399798860","https://openalex.org/W2577417592","https://openalex.org/W2749093550","https://openalex.org/W2752832485","https://openalex.org/W2766329853","https://openalex.org/W2798435099","https://openalex.org/W2805627121","https://openalex.org/W2806684872","https://openalex.org/W2904824295","https://openalex.org/W2909319943","https://openalex.org/W2909601815","https://openalex.org/W2914764075","https://openalex.org/W2946062220","https://openalex.org/W2953954518","https://openalex.org/W2977419832","https://openalex.org/W2997932026","https://openalex.org/W3009034279","https://openalex.org/W3016071202","https://openalex.org/W3082769757","https://openalex.org/W3094745711","https://openalex.org/W3115470284","https://openalex.org/W3135586178","https://openalex.org/W3147945423","https://openalex.org/W3194506215","https://openalex.org/W4239728551","https://openalex.org/W4249899149","https://openalex.org/W6676995458","https://openalex.org/W6713014172","https://openalex.org/W6765207028","https://openalex.org/W6800815191"],"related_works":["https://openalex.org/W3170224572","https://openalex.org/W3095506574","https://openalex.org/W3190449293","https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W2329175123"],"abstract_inverted_index":{"Physical":[0],"unclonable":[1],"functions":[2],"(PUFs)":[3],"are":[4,24],"promising":[5],"solutions":[6],"for":[7,159],"low-cost":[8],"device":[9],"authentication;":[10],"hence,":[11],"ignoring":[12],"the":[13,61,133,176,196,209],"security":[14],"of":[15,64,151,203,211],"PUFs":[16,23,42,111,125],"is":[17],"becoming":[18],"increasingly":[19],"difficult.":[20],"Generally,":[21],"strong":[22,41,110,124],"vulnerable":[25],"to":[26,54,60,96,108,122,147],"classical":[27,33],"machine":[28],"learning":[29],"(ML)":[30],"attacks;":[31],"however,":[32],"ML":[34],"attacks":[35,50,71,121,136,178],"do":[36],"not":[37],"perform":[38],"well":[39],"on":[40,74],"with":[43,93,126,131,142,187,192],"complex":[44,127],"structures.":[45,128],"Side-channel":[46],"analysis":[47],"(SCA)":[48],"hybrid":[49,70,120,135],"provide":[51],"efficient":[52],"approaches":[53],"modeling":[55,194,204],"XOR":[56],"APUF.":[57],"However,":[58],"owing":[59],"inadequate":[62],"exploitation":[63],"all":[65],"available":[66],"data,":[67],"recent":[68],"SCA":[69,119],"may":[72],"fail":[73],"novel":[75],"PUF":[76],"designs,":[77],"such":[78],"as":[79],"MPUF":[80],"and":[81,162,185,208],"iPUF.":[82],"Thus,":[83],"herein,":[84],"we":[85],"introduce":[86],"a":[87,138,143],"method":[88],"that":[89,175],"combines":[90],"challenge-response":[91],"pairs":[92,99],"side-channel":[94],"information":[95],"construct":[97],"challenge-synthetic-feature":[98],"(CSPs)":[100],"via":[101],"feature":[102],"cross,":[103],"thereby":[104],"making":[105],"it":[106],"possible":[107],"model":[109,123,180],"through":[112,166],"multiclass":[113,117],"classification.":[114],"We":[115],"propose":[116],"classification-based":[118],"When":[129],"provided":[130],"CSPs,":[132],"proposed":[134,177,197],"use":[137],"feed-forward":[139],"neural":[140],"network":[141],"softmax":[144],"activation":[145],"function":[146],"build":[148],"combined":[149,154],"models":[150,155],"PUFs.":[152],"The":[153],"predict":[156],"class":[157],"labels":[158],"given":[160],"challenges":[161],"then":[163],"reveal":[164],"responses":[165],"simple":[167],"mappings":[168],"from":[169],"these":[170],"labels.":[171],"Experimental":[172],"results":[173],"show":[174],"could":[179],"16-XOR":[181],"APUF,":[182],"(128,5)-MPUF,":[183],"(8,8)-iPUF,":[184],"(2,16)-iPUF":[186],"accuracies":[188],"exceeding":[189],"94%.":[190],"Compared":[191],"state-of-the-art":[193],"techniques,":[195],"attack":[198],"has":[199],"advantages":[200],"in":[201],"terms":[202],"accuracy,":[205],"time":[206],"cost,":[207],"size":[210],"required":[212],"training":[213],"data.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
