000 03392nam a22005895i 4500
001 978-3-031-29207-1
003 DE-He213
005 20240207153813.0
007 cr nn 008mamaa
008 230503s2023 sz | s |||| 0|eng d
020 _a9783031292071
_9978-3-031-29207-1
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aWisiol, Nils.
_eauthor.
_0(orcid)0000-0003-2606-614X
_1https://orcid.org/0000-0003-2606-614X
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aModeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs
_h[electronic resource] /
_cby Nils Wisiol.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aXI, 118 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aT-Labs Series in Telecommunication Services,
_x2192-2829
500 _aAcceso multiusuario
505 0 _aIntroduction -- Physical Unclonable Functions -- XOR Arbiter PUFs -- XOR Arbiter PUFs with Input Transformation -- Interpose PUF -- Feed-Forward Arbiter PUF -- Beli PUF -- LP-PUF -- pypuf: Python Software Library for PUF Research -- Conclusion.
520 _aThis book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.
541 _fUABC ;
_cPerpetuidad
650 0 _aSignal processing.
650 0 _aElectronic circuits.
650 0 _aSecurity systems.
650 1 4 _aSignal, Speech and Image Processing .
650 2 4 _aElectronic Circuits and Systems.
650 2 4 _aSecurity Science and Technology.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031292064
776 0 8 _iPrinted edition:
_z9783031292088
776 0 8 _iPrinted edition:
_z9783031292095
830 0 _aT-Labs Series in Telecommunication Services,
_x2192-2829
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-29207-1
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c263666
_d263665