The PUFs we attacked successfully include standard Arbiter PUFs and Ring Oscillator PUFs of arbitrary sizes, and XOR Arbiter PUFs, Lightweight Secure PUFs, and Feed-Forward Arbiter PUFs of up to a given size and complexity. Our attacks are based upon various machine learning techniques, including Logistic Regression and Evolution Strategies. Our work will be useful to PUF designers and attackers alike.
Category / Keywords: Implementation / Physical Unclonable Functions, Cryptanalysis, Machine Learning, Physical Cryptography Publication Info: --- Date: received 1 May 2010, last revised 3 May 2010 Contact author: ruehrmai at in tum de Available format(s): PDF | BibTeX Citation Version: 20100503:080643 (All versions of this report) Short URL: ia.cr/2010/251 Discussion forum: Show discussion | Start new discussion