{"id":"https://openalex.org/W2080284304","doi":"https://doi.org/10.1145/1866307.1866335","title":"Modeling attacks on physical unclonable functions","display_name":"Modeling attacks on physical unclonable functions","publication_year":2010,"publication_date":"2010-10-04","ids":{"openalex":"https://openalex.org/W2080284304","doi":"https://doi.org/10.1145/1866307.1866335","mag":"2080284304"},"language":"en","primary_location":{"id":"doi:10.1145/1866307.1866335","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://mediatum.ub.tum.de/node?id=1287479","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008067534","display_name":"Ulrich R\u00fchrmair","orcid":"https://orcid.org/0000-0003-0156-6738"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Ulrich R\u00fchrmair","raw_affiliation_strings":["TU M\u00fcnchen, 80333 M\u00fcnchen, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"TU M\u00fcnchen, 80333 M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060472610","display_name":"Frank Sehnke","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Frank Sehnke","raw_affiliation_strings":["TU M\u00fcnchen, 80333 M\u00fcnchen, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"TU M\u00fcnchen, 80333 M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110043282","display_name":"Jan S\u00f6lter","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan S\u00f6lter","raw_affiliation_strings":["TU M\u00fcnchen, 80333 M\u00fcnchen, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"TU M\u00fcnchen, 80333 M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062245154","display_name":"Gideon Dror","orcid":null},"institutions":[{"id":"https://openalex.org/I4210141777","display_name":"Academic College of Tel Aviv-Yafo","ror":"https://ror.org/04cg6c004","country_code":"IL","type":"education","lineage":["https://openalex.org/I4210141777"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Gideon Dror","raw_affiliation_strings":["The Academic College of Tel Aviv - Jaffa, Tel Aviv, 61083 , Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The Academic College of Tel Aviv - Jaffa, Tel Aviv, 61083 , Israel","institution_ids":["https://openalex.org/I4210141777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000525449","display_name":"Srinivas Devadas","orcid":"https://orcid.org/0000-0001-8253-7714"},"institutions":[{"id":"https://openalex.org/I4210110987","display_name":"IIT@MIT","ror":"https://ror.org/01wp8zh54","country_code":"US","type":"facility","lineage":["https://openalex.org/I30771326","https://openalex.org/I4210110987"]},{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srinivas Devadas","raw_affiliation_strings":["MIT, Cambridge, MA, USA","MIT, Cambridge MA, USA#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"MIT, Cambridge, MA, USA","institution_ids":["https://openalex.org/I4210110987"]},{"raw_affiliation_string":"MIT, Cambridge MA, USA#TAB#","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071172037","display_name":"J\u00fcrgen Schmidhuber","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"J\u00fcrgen Schmidhuber","raw_affiliation_strings":["TU M\u00fcnchen, 80333 M\u00fcnchen, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"TU M\u00fcnchen, 80333 M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008067534"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":29.5772,"has_fulltext":false,"cited_by_count":1006,"citation_normalized_percentile":{"value":0.99786166,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"237","last_page":"249"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arbiter","display_name":"Arbiter","score":0.9620486497879028},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.7187652587890625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6992379426956177},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5702518820762634},{"id":"https://openalex.org/keywords/ring-oscillator","display_name":"Ring oscillator","score":0.5152459740638733},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.43895548582077026},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40321364998817444},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40004098415374756},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.33016237616539},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3294351100921631},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.22072556614875793},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21488702297210693},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13793706893920898},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.13079717755317688},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07352611422538757}],"concepts":[{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.9620486497879028},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.7187652587890625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6992379426956177},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5702518820762634},{"id":"https://openalex.org/C104111718","wikidata":"https://www.wikidata.org/wiki/Q2153973","display_name":"Ring oscillator","level":3,"score":0.5152459740638733},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.43895548582077026},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40321364998817444},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40004098415374756},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33016237616539},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3294351100921631},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.22072556614875793},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21488702297210693},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13793706893920898},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.13079717755317688},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07352611422538757},{"id":"https://openalex.org/C46362747","wikidata":"https://www.wikidata.org/wiki/Q173431","display_name":"CMOS","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1866307.1866335","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1287479","is_oa":true,"landing_page_url":"http://mediatum.ub.tum.de/node?id=1287479","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:mediatum.ub.tum.de:node/1287479","is_oa":true,"landing_page_url":"http://mediatum.ub.tum.de/node?id=1287479","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W132856916","https://openalex.org/W206440355","https://openalex.org/W576529879","https://openalex.org/W1506806321","https://openalex.org/W1555380212","https://openalex.org/W1559956479","https://openalex.org/W1585508783","https://openalex.org/W1646805036","https://openalex.org/W1663973292","https://openalex.org/W1963105592","https://openalex.org/W1977314849","https://openalex.org/W1995871244","https://openalex.org/W2000171858","https://openalex.org/W2079275996","https://openalex.org/W2099319333","https://openalex.org/W2113322447","https://openalex.org/W2114337476","https://openalex.org/W2116374153","https://openalex.org/W2123482651","https://openalex.org/W2130351941","https://openalex.org/W2137153141","https://openalex.org/W2143908786","https://openalex.org/W2145858709","https://openalex.org/W2151759197","https://openalex.org/W2169212403","https://openalex.org/W2171762889","https://openalex.org/W2172255798","https://openalex.org/W2225497109","https://openalex.org/W4212863985","https://openalex.org/W4386706555","https://openalex.org/W6670472001","https://openalex.org/W6684566051","https://openalex.org/W6990023262"],"related_works":["https://openalex.org/W4386215421","https://openalex.org/W4288102672","https://openalex.org/W4386278306","https://openalex.org/W4375857400","https://openalex.org/W2789961440","https://openalex.org/W2793303626","https://openalex.org/W1473150265","https://openalex.org/W4233101919","https://openalex.org/W2582407527","https://openalex.org/W2556738576"],"abstract_inverted_index":{"We":[0],"show":[1],"in":[2],"this":[3],"paper":[4],"how":[5],"several":[6],"proposed":[7],"Physical":[8],"Unclonable":[9],"Functions":[10],"(PUFs)":[11],"can":[12,48,54],"be":[13,55,140],"broken":[14],"by":[15],"numerical":[16],"modeling":[17],"attacks.":[18],"Given":[19],"a":[20,27,32,107],"set":[21],"of":[22,26,64,90,104],"challenge-response":[23],"pairs":[24],"(CRPs)":[25],"PUF,":[28,52],"our":[29],"attacks":[30,113],"construct":[31],"computer":[33],"algorithm":[34,47],"which":[35],"behaves":[36],"indistinguishably":[37],"from":[38],"the":[39,51,62,74],"original":[40],"PUF":[41,143],"on":[42,73],"almost":[43],"all":[44,66],"CRPs.":[45],"This":[46,60],"subsequently":[49],"impersonate":[50],"and":[53,57,68,86,93,100,110,124,138,145],"cloned":[56],"distributed":[58],"arbitrarily.":[59],"breaks":[61],"security":[63],"essentially":[65],"applications":[67],"protocols":[69],"that":[70],"are":[71,114],"based":[72,115],"respective":[75],"PUF.":[76],"The":[77],"PUFs":[78,85,89,103],"we":[79],"attacked":[80],"successfully":[81],"include":[82],"standard":[83],"Arbited":[84],"Ring":[87],"Oscillator":[88],"arbitrary":[91],"sizes,":[92],"XO":[94],"Arbiter":[95,102],"PUFs,":[96,99,137],"Lightweight":[97],"Secure":[98],"Feed-Forward":[101],"up":[105],"to":[106,130,142],"given":[108],"size":[109],"complexity.":[111],"Our":[112,127],"upon":[116],"various":[117],"machine":[118],"learning":[119],"techniques":[120],"including":[121],"Logistic":[122],"Regression":[123],"Evolution":[125],"Strategies.":[126],"work":[128],"leads":[129],"new":[131],"design":[132],"requirements":[133],"for":[134],"secure":[135],"electrical":[136],"will":[139],"useful":[141],"designers":[144],"attackers":[146],"alike.":[147]},"counts_by_year":[{"year":2026,"cited_by_count":15},{"year":2025,"cited_by_count":63},{"year":2024,"cited_by_count":66},{"year":2023,"cited_by_count":77},{"year":2022,"cited_by_count":73},{"year":2021,"cited_by_count":83},{"year":2020,"cited_by_count":88},{"year":2019,"cited_by_count":93},{"year":2018,"cited_by_count":74},{"year":2017,"cited_by_count":67},{"year":2016,"cited_by_count":61},{"year":2015,"cited_by_count":66},{"year":2014,"cited_by_count":63},{"year":2013,"cited_by_count":40},{"year":2012,"cited_by_count":41}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
