{"id":"https://openalex.org/W4285303121","doi":"https://doi.org/10.1109/tifs.2022.3189533","title":"Neural Network Modeling Attacks on Arbiter-PUF-Based Designs","display_name":"Neural Network Modeling Attacks on Arbiter-PUF-Based Designs","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285303121","doi":"https://doi.org/10.1109/tifs.2022.3189533"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3189533","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3189533","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007833679","display_name":"Nils Wisiol","orcid":"https://orcid.org/0000-0003-2606-614X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nils Wisiol","raw_affiliation_strings":["Security in Telecommunications, Technische Universit&#x00E4;t Berlin, Berlin, Germany","t Berlin, Germany"],"raw_orcid":"https://orcid.org/0000-0003-2606-614X","affiliations":[{"raw_affiliation_string":"Security in Telecommunications, Technische Universit&#x00E4;t Berlin, Berlin, Germany","institution_ids":[]},{"raw_affiliation_string":"t Berlin, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036783104","display_name":"Bipana Thapaliya","orcid":"https://orcid.org/0000-0002-5103-9330"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bipana Thapaliya","raw_affiliation_strings":["Department of Computer Science, Texas Tech University, Lubbock, TX, USA"],"raw_orcid":"https://orcid.org/0000-0002-5103-9330","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003062703","display_name":"Khalid T. Mursi","orcid":"https://orcid.org/0000-0001-8032-8484"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khalid T. Mursi","raw_affiliation_strings":["Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-8032-8484","affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001159554","display_name":"Jean\u2010Pierre Seifert","orcid":"https://orcid.org/0000-0002-5372-4825"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Seifert","raw_affiliation_strings":["Security in Telecommunications, Technische Universit&#x00E4;t Berlin, Berlin, Germany","Texas Tech University, Lubbock, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Security in Telecommunications, Technische Universit&#x00E4;t Berlin, Berlin, Germany","institution_ids":[]},{"raw_affiliation_string":"Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006229285","display_name":"Yu Zhuang","orcid":"https://orcid.org/0000-0001-5561-1480"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yu Zhuang","raw_affiliation_strings":["Department of Computer Science, Texas Tech University, Lubbock, TX, USA","Technische Universit&#x00E4","t Berlin, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas Tech University, Lubbock, TX, USA","institution_ids":["https://openalex.org/I12315562"]},{"raw_affiliation_string":"Technische Universit&#x00E4","institution_ids":[]},{"raw_affiliation_string":"t Berlin, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007833679"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":15.6416,"has_fulltext":false,"cited_by_count":73,"citation_normalized_percentile":{"value":0.99659071,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"17","issue":null,"first_page":"2719","last_page":"2731"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.964900016784668,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arbiter","display_name":"Arbiter","score":0.9855524301528931},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8189343214035034},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5599676370620728},{"id":"https://openalex.org/keywords/toolbox","display_name":"Toolbox","score":0.4851449429988861},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.47545167803764343},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43060675263404846},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38539499044418335},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3819597363471985},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16084018349647522},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15491482615470886}],"concepts":[{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.9855524301528931},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8189343214035034},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5599676370620728},{"id":"https://openalex.org/C2777655017","wikidata":"https://www.wikidata.org/wiki/Q1501161","display_name":"Toolbox","level":2,"score":0.4851449429988861},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.47545167803764343},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43060675263404846},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38539499044418335},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3819597363471985},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16084018349647522},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15491482615470886},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3189533","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3189533","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5069866428","display_name":null,"funder_award_id":"2103563","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1917333369","https://openalex.org/W1975518327","https://openalex.org/W2016244202","https://openalex.org/W2080284304","https://openalex.org/W2094192676","https://openalex.org/W2145858709","https://openalex.org/W2151759197","https://openalex.org/W2169212403","https://openalex.org/W2248741777","https://openalex.org/W2265382507","https://openalex.org/W2289245055","https://openalex.org/W2321234954","https://openalex.org/W2496851392","https://openalex.org/W2510092599","https://openalex.org/W2765674159","https://openalex.org/W2893712976","https://openalex.org/W2909319943","https://openalex.org/W2953954518","https://openalex.org/W2977109867","https://openalex.org/W2980530771","https://openalex.org/W3000483445","https://openalex.org/W3002189921","https://openalex.org/W3008928417","https://openalex.org/W3012424508","https://openalex.org/W3092697589","https://openalex.org/W3135586178","https://openalex.org/W3158938853","https://openalex.org/W3164742099","https://openalex.org/W3212347712","https://openalex.org/W4238893454","https://openalex.org/W4239728551","https://openalex.org/W4249899149","https://openalex.org/W4255949318","https://openalex.org/W6631190155","https://openalex.org/W6676995458","https://openalex.org/W6765207028","https://openalex.org/W6795289127","https://openalex.org/W6931288921"],"related_works":["https://openalex.org/W2884038052","https://openalex.org/W2982348224","https://openalex.org/W2135481122","https://openalex.org/W3161858668","https://openalex.org/W2115668703","https://openalex.org/W4230671735","https://openalex.org/W143296170","https://openalex.org/W2129720900","https://openalex.org/W2138266884","https://openalex.org/W3124125590"],"abstract_inverted_index":{"By":[0],"revisiting,":[1],"improving,":[2],"and":[3,27,39,54,66,73,96,123,138],"extending":[4],"recent":[5],"neural-network":[6],"based":[7],"modeling":[8,71,111,119],"attacks":[9,72,83,112,120],"on":[10,121],"XOR":[11,20],"Arbiter":[12,21,25],"PUFs":[13,29,122],"from":[14],"the":[15,64,79,90,101,114,129,136,149,158],"literature,":[16],"we":[17,62],"show":[18,108],"that":[19,109],"PUFs,":[22,26],"(XOR)":[23],"Feed-Forward":[24],"Interpose":[28],"can":[30,143],"be":[31],"attacked":[32],"faster,":[33],"up":[34],"to":[35,116,154],"larger":[36],"security":[37,134],"parameters,":[38],"with":[40],"an":[41],"order":[42],"of":[43,68,78,81,87,128,151,160],"magnitude":[44],"fewer":[45],"challenge-response":[46],"pairs":[47],"than":[48],"previously":[49],"known":[50],"both":[51],"in":[52,55,140],"simulation":[53],"silicon":[56],"data.":[57],"To":[58],"support":[59],"our":[60,152],"claim,":[61],"discuss":[63],"differences":[65],"similarities":[67],"recently":[69],"proposed":[70],"offer":[74],"a":[75,146],"fair":[76],"comparison":[77],"performance":[80,99],"these":[82],"by":[84],"implementing":[85],"all":[86],"them":[88],"using":[89],"popular":[91],"machine":[92],"learning":[93],"framework":[94],"Keras":[95],"comparing":[97],"their":[98],"against":[100],"well-studied":[102],"Logistic":[103],"Regression":[104],"attack.":[105],"Our":[106],"findings":[107],"neural-network-based":[110],"have":[113],"potential":[115],"outperform":[117],"traditional":[118],"must":[124],"hence":[125],"become":[126],"part":[127],"standard":[130],"toolbox":[131],"for":[132,148],"PUF":[133,155],"analysis;":[135],"code":[137],"discussion":[139],"this":[141,161],"paper":[142],"serve":[144],"as":[145],"basis":[147],"extension":[150],"results":[153],"designs":[156],"beyond":[157],"scope":[159],"work.":[162]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":22},{"year":2023,"cited_by_count":21},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
