Arbiter PUFA Review of Design Composition and Security Aspects
Arbiter PUFA Review of Design Composition and Security Aspects
ABSTRACT Hardware security modules play a crucial role in protecting and preserving technologically
integrated systems that are used in daily life. They employ cryptographic protocols to secure a system against
adversaries. Generally, cryptographic algorithms and security keys are quintessential for maintaining the
security of a system. Cryptography uses a secret key to encipher and decipher the data. These secret keys are
stored in a non-volatile memory that attackers can easily access. The hardware security primitive, Physical
Unclonable Function (PUF) is a promising alternative for enhancing the security of interconnected devices.
A PUF produces an output in response to an input based on the physical structure and intrinsic manufacturing
variations of an integrated circuit (IC). The generated random response being unpredictable, act as a robust
secret key in cryptographic protocols. The first silicon PUF is the Arbiter PUF, which can instantly produce
significantly more secret keys based on the input with a lightweight design. Due to its advantage, it is best
suited for device authentication in resource-constrained applications employing the Internet of Things (IoT).
The PUF is also suitable for applications such as the Internet of Vehicles, the Internet of Medical Things,
RFID (radio frequency identification) tags, and smart cards. In this paper, the basic Arbiter PUF design is
implemented in ZedBoard to analyze the PUF performance characteristics for 16, 32, and 64-bit responses.
A review of Arbiter PUF design, different compositions of Arbiter PUF, their individual characteristics, and
vulnerabilities against machine-learning attacks have been presented at their broader best in this paper.
INDEX TERMS Arbiter PUF, cryptography, hardware security, machine learning attacks, physical unclon-
able function, ZedBoard.
semiconductor industry, the ICs housed in the same die incur attacks. However, the weak PUF size linearly increases to
inadvertent manufacturing variations, inter and intra-die vari- enable the extraction of more responses in tune with the
ations, doping level variations, and even a few logic pro- bit length. Each type of PUF has its own set of advantages
cess modules exhibiting different outputs for the same logic and disadvantages, and the specific type that is most suitable
functionality [6]. This unique behavior, which is even more for a given application depends on the requirements and
dominant for contemporary lower technology nodes, and usu- constraints of that application.
ally considered detrimental in the semiconductor industry, Arbiter PUF is the most extensively studied work in litera-
is being exploited in developing PUFs.This feature of PUF ture since it depends upon delay and timing information pro-
is exploited for generating its fingerprint, which is specific to vided by the ICs. In addition, they can be implemented using
the chip. IoT applications that necessitate lightweight security standard manufacturing processes, which makes them rela-
measures can integrate PUF for impenetrable security solu- tively easy to integrate into existing electronic systems. As a
tions at a lower cost factor. The paper offers a deeper insight result, they have gained significant attention from researchers
into the design, reproducibility, and security of PUFs, with a in fields such as computer security, license management, and
focus on the Arbiter PUF, its variants, and their resilience to secured communication. Rigorous researches have emerged
vulnerability. in the mathematical modeling of the APUF and its composi-
tions using Machine Learning, Side-Channel Analysis, and
Deep Learning. They motivate more research on APUF to
A. RELATED WORK make it increasingly resistant to modeling attacks.
PUFs can be classified as strong PUFs and weak PUFs based The significant contributions of the paper are as follows:
on the number of Challenge and Response Pairs (CRPs) • Understanding of the concept of PUF and its perfor-
employed [7]. Strong PUFs have a larger number of CRPs, mance characteristics with illustrative examples.
and the size of each CRP increases significantly with the • Design of a basic Arbiter PUF with emphasis on the
number of PUF circuits, and they ensure a secure environ- placement and routing of the switch block and the
ment without additional cryptographic hardware. A weak arbiter. The design is implemented in the ZedBoard
PUF, also termed ‘‘physically obfuscated key’’ [8], on the platform to evaluate its PUF metrics for the 16, 32, and
other hand, generally possesses one challenge that is used for 64-bit responses.
secured key storage. Several strong PUFs such as Arbiter PUF • Application of Arbiter PUF in security protocols during
(APUF) [6], Loop PUF [9], Configurable Ring Oscillator the enrollment and authentication phases.
PUF (CRO PUF) [10], Bistable Ring PUF (BR PUF) [11], • Elucidation of the characteristics and vulnerabilities of
Dual Mode PUF [12], and Configurable Tristate PUF (CT different compositions of Arbiter PUF.
PUF) [13] have been proposed in the literature with sig- • The mathematical modeling of the variants of APUF and
nificantly enhanced performance features. Loop PUF suf- its resilience against adversary attacks.
fers from replicating the delay chains when implemented The paper is structured as follows. Section II provides
in a Field Programmable Gate Array (FPGA) and needs a brief introduction to PUF and its metrics. Section III
more investigation for its robustness against machine learning elaborates the Arbiter PUF with a focus on design, timing
attacks. CRO PUF includes a specific inverter to the delay delay modeling, placement and routing, and typical applica-
chain based on the configuration of the challenge to the tions. Section IV presents the compositions of Arbiter PUF.
multiplexer. This delay information is easily traceable by the Section V describes the machine learning attacks achieved in
adversary to model the PUF. Comparing CT PUF to APUF, different types of Arbiter PUFs for various variants published
CRO PUF, BR PUF, and Dual Mode PUF, the modeling in the literature. Section VI concludes by highlighting the
accuracy of CT PUF utilizing an artificial neural network opportunities and future scope of research.
equals 50% [13]. Almost all the promising designs have
been successfully modeled with and without a mathematical II. PHYSICAL UNCLONABLE FUNCTIONS
model. Yet, the hardware complexity of APUF is significantly PUF can be precisely defined as a simulated physical system
lower than the other strong PUFs. using an input or challenge to generate a response or out-
Additionally, various other weak PUFs have also been put [20], [21]. Mathematically, a PUF can be defined as,
developed and studied in addition to strong PUFs. They
employ adiabatic logic [14], [15], delay-based design [16], f : Ch → R. (1)
memory-based logic [17], [18], and the metastability fea- f (ch) : r(ch ∈ Ch, r ∈ R). (2)
ture [19] to generate a secret key. These include the Ring
Oscillator PUFs (RO PUFs) [16] that use the phase delay where Ch is an external stimulus or an applied challenge, and
between the oscillation of two or more connected inverters R describes the output or response produced by the PUF.
to generate a unique response. The SRAM PUFs [17] use A PUF design is made such that replicating two identical
the inherent variations in the threshold voltages of transistors PUFs, even with extensive computational resources, becomes
in an SRAM cell to generate a unique response. The weak virtually impossible [5], [6]. The responses for the same PUF
PUFs being harder to model, are resilient to machine learning received from different ICs are unique, which acts as the
LUT for each NAND gate, thus achieving a symmetrical path The recursive delay vector w = (w1 , .., w(n+1) ) needs to be
with reduced bias in response. computed to design an efficient model for an APUF.
w1 = δ0,1 − δ1,1 , (16)
B. IMPLEMENTATION OF SWITCH BLOCK
wi = δ0,i−1 + δ1,i−1 + δ0,i − δ1,i , (17)
Considerable research contributions are found in achieving
symmetrical routing between the switching blocks. The var- and
ious configurations of SB design include employing MUX
wn+1 = δ0,n − δ1,n . (18)
primitives [33], [34], [35], Programmable Delay Line (PDL)
logic [32], [36], a 6-2 input LUT combining two parallel The total delay time of an n-stage APUF with a scalar multi-
MUX in one LUT [37], PDL and MUX without cross- plication 8 = (81 , . . . 8n+1 )ϵ {−1, 1}n+1 is given by,
coupling [38], tri-state buffers [39], and Path Changing
1Dn = wT φ. (19)
Switch (PCS) [40] focusing on response bias and enhanced
uniqueness. A Schmitt trigger has been used as a buffer APUFs require identical logic and routing for their com-
between the switch blocks instead of a CMOS (Complemen- binational paths so that the difference in delay across a
tary Metal-Oxide Semiconductor) buffer as it is susceptible defined path occurs only due to process variations. In order
to process variations in [41]. Recently, a 4 × 4 switch block to validate this fact, initially, the APUF was implemented by
has been presented instead of a 2 × 2 switch block, which the authors in a Spartan 2 FPGA device with the average
can generate a maximum of 6 responses [42]. However, it is inter-chip and intra-chip values being 1.05% and 0.10%,
claimed that the improved performance is only for random respectively. It ensures that, on average, only one response
placement. The path delay of a classical APUF has been remains unique, and the reliability of obtaining the same
transformed based on the acquired response of 0 or 1 using response is also significantly less, as also claimed in [6]. The
an adjustable module in an Adjustable APUF (A-APUF) [43]. response bits are biased depending on the relative delays of
A sub-threshold APUF [44], [45] has been designed based on the different paths through the circuit, addressing the neces-
the premise that these are more prone to process variations sity of symmetrical placement and routing of the delay paths
in 45 nm deep sub-micron technologies. The switch blocks in the FPGA. In comparison, the symmetrical placement
made of multiplexers have been replaced with NAND gates improved the inter-chip to 23% when implemented in an
Application-Specific Integrated Circuit (ASIC) environment, TABLE 2. Uniqueness of APUF in various FPGA boards.
though it remained far from the desired value of 50% [6],
[47]. To accurately implement delay paths, FPGA requires
hard macros to integrate fixed placement and routing, and the
designer has to follow a lower level of abstraction instead of
RTL.
The responses are biased either due to the unsymmetrical
routing of instances or the architecture of the APUF model
and they can be termed implementation and architectural
biases [48], [49]. The technology node, implementation plat-
form, and external environmental factors will not affect the
architectural bias. As a result, the bias in the CRPs will
be only due to the architectural flaws of the PUF design. illustrates that the symmetrical placement of APUF in the
The implementation bias would be much influenced by the SoC board has resulted in a significantly high uniqueness of
evaluated FPGA platform that impacts the output based on 42.20% (16-bit) for 50,000 CRPs compared to other FPGA
CRPs. Different authors have handled broad categories of platforms. The uniqueness for 64-bit is 37.75% which is
placement of the SB for an APUF. While designing the MUX comparatively higher than other technology boards. The chal-
logic of the SB, one MUX primitive [33], [34], [35] from lenges were incremented by 1-bit to have a one-bit flip in the
each slice can be chosen for the upper and lower paths placed challenge, and the corresponding responses were recorded.
adjacently, thus setting the APUF instance horizontally or This customized IP design for a SOC board confirms that
vertically. Generally, in FPGA, each slice consists of four it is the most preferable one for lightweight and low-cost
LUTs in it. Tcl commands (BEL) will help fix the LUT in IoT applications, and it necessitates no additional overhead
positions A, B, C, and D in each slice. The input pins in the resources for error correction codes and fuzzy extractors.
LUTs can be locked by using the lock-pin attribute in the
Hardware Description Language (HDL) code [32]. The MUX E. APPLICATION, SECURITY PROTOCOLS, AND NIST
primitive can be replaced either by a 3-1 LUT for each MUX STANDARDS
logic or a 6-2 LUT for one switch block [37]. Each MUX/SB Physical Unclonable Functions can be used in various appli-
LUTs can be placed in one slice to have a unique token. cations due to their unique property and unclonability, rang-
If more than one LUTs are occupied in a slice while routing, ing from secure cryptographic key storage [51], [52], entity
it can result in a random placement of the switch block in an authentication [52], [53], authentication framework [54],
APUF. A random sequence of LUT for one APUF instance keyed-hash message authentication code [4], RFID tags [55],
will result in reduced uniformity [50]. Thus, it is preferable [56], [57], smart cards [5], [58], Certified execution
to place the arbiter in a separate slice. and software licensing [59], Digital rights management,
set-top boxes, and distributed computation [6], and IP
protection [60].
D. IMPLEMENTATION IN ZedBoard The demand for an increased number of heterogeneous
To validate the APUF, we have implemented it as a cus- devices in the IoT has also raised concerns for its secu-
tomized IP formed in the ZedBoard using a 3-1 LUT for rity. Hence, the IC vendors exploit resource-constrained
a MUX configuration, as shown in Fig.10. The upper and hardware-based technology solutions to secure IoT devices.
lower paths are symmetrically placed in the adjacent slices The usage of PUF in security protocols has also gained more
to enhance the manufacturing variations. Fig. 10 illustrates importance due to its lightweight structure and more CRP
the design of APUF as a customized IP (Intellectual Prop- space. The PUF models integrate additional techniques to
erty) to communicate between Programmable Logic (PL) obfuscate the challenge and hide the responses from mali-
and Processing System (PS). Using Xilinx SDK (Software cious attacks. Different authentication protocols [6], [59]
Development Kit), the challenges were given to the APUF, have been proposed to secure the secret key generated by
and responses were received. Pre-processing of responses the PUF employing fuzzy extractors and error correction
to evaluate the PUF parameters was realized using MAT- code [52] in providing reliable CRPs.
LAB. The APUF was designed for 16-bit, 32-bit, and 64- The security offered by the protocol increases as the prover
bit challenges, and responses of similar size were achieved. and the verifier can opt for more CRPs while using APUF.
The PUF metrics, namely, uniqueness, uniformity, and reli- Furthermore, the used CRPs are discarded after successful
ability, have also been evaluated. The uniformity of APUF authentication and updated with a new set of CRPs, which
is evaluated to be 63.65%, 63.78%, and 53.76% for 16-bit, is a tremendous advantage of using APUF. Table 3 shows the
32-bit, and 64-bit challenges. Thus, the responses of the various protocols that use APUF and its variants for secured
basic APUF are more biased towards 1. The reliability for authentication. It presents a glimpse of a few protocols. The
16-bit, 32-bit, and 64-bit challenges are 98.86%, 99.52%, Two-Stage Multiple-Choice Arbiter-based PUF (TSMCA
and 97.96%, validating a reliable random output. Table 2 PUF) proposed in [2] uses bi-directional authentication to
FIGURE 10. Customized IP design of APUF connected with ZYNQ processing system.
TABLE 3. Security protocols used in authentication using APUF. model to produce a response to the unexpected challenge. The
steps are as follows,
• Exchange of PUF IDs and initialization messages
• Verifier sends a pseudo-challenge C1 to the prover
• Prover transforms C1 to dynamically generate pseudo-
challenges C2 and C3 based on the transformed response
(RV )
• Creation of unique secret patterns (g)
• Verifier searches for the matches of the secret pattern
received with any secret patterns specific to the particu-
lar device
The communication protocol in [62] has three phases,
viz., enrollment, authentication, and update, to authorize the
prover device as shown in Fig. 12. It is illustrated as follows:
• Enrollment:Trusted party delivers an initial message to
the server and the authenticating device
• FSM in the authentication server model responds to the
message
• Quadruple challenge is issued to the APUF and the
majority voter to generate a reliable 8-bit response
• APUF model is built using a tripartite classification
algorithm
• Authentication:Device and the server communicate with
each other to confirm authorization
improve the resilience between the server and tag and vice • Server acknowledges the device request by providing a
versa while authenticating RFID devices. The PUF has been random number (RN )
embedded in the RFID tag and provides the seed as a pass- • Random number produces a quadruple response in the
word to the random number generator to generate challenges. device using the PUF model (RF )
During authentication, the responses get verified by a string- • The server generates the response (RM ) for the same RN
matching method. using a software PUF model
In [61], a lightweight PUF-based authentication protocol • Device is authorized only if both responses are equal
utilizes APUF for authentication between the prover and • Update:After a fixed number of successful authentica-
verifier as shown in Fig. 11. The authentication protocol con- tion attempts, the relevant parameters are periodically
siders that the prover and the verifier possess the PUF circuit updated from memory during the update phase.
the delay characterization technique to obtain a maximum APUF. The cross-coupled NAND arbiter has been chosen
delay for different input patterns. The tuning blocks are free over the D-FF since it contributes a 10% skew to the routing
to be located at any place in the structure of PUF. Depend- path. Thus, Flip-Flop APUF shown in Fig. 17 uses only
ing on their selector inputs, these tuning blocks can insert 44 slices to generate a 1-bit response compared to 129 slices
additional delays in the top or bottom paths. The significant for a 64-bit challenge for an APUF design by saving 66% of
difference between the switches and the tuning blocks lies hardware resources.
in the connection of selector lines. The selector lines are The flip-flops are initially reset by CLEAR and then
standard for upper and lower paths, while in tuning blocks, enabled by the rising edge of the clock signal using START.
the upper and lower paths have different selector lines. The At the end of the three MUXes for every slice, the output
top and bottom paths and the arbiter have been symmetri- will select any of the four FFs to determine the delay path
cally routed. The tuning blocks also eliminate the bias in corresponding to the given challenge. The output from each
the delay. The design is evaluated for the same challenges, upper or lower path (TU or TL) of the PUF cell becomes an
and the responses have been obtained after majority voting input to the clock port of the next PUF cell. It continues till
to improve reliability. It enhances the response robustness the last stage, and its output is fed to the arbiter with the
and alleviates the meta-stability problem of the arbiter. The response bit generated based on the racing signal entering
author has also arrived at a new hypothesis that the responses the arbiter. The design [80] has also been evaluated for min-
were robust when the delay difference is found to be more entropy, conditional Shannon entropy, and conditional min-
significant at the arbiter input. entropy, as found to be 0.54, 0.90, and 0.61, respectively.
Additional delay incorporated into the Flip-Flop APUF
2) FLIP-FLOP BASED APUF DESIGN in FOXFF-APUF (Feedback Oriented XORed FF-APUF)
Flip-Flop APUF proposed by Gu et al. inserts additional slightly improves the uniqueness of an 8-bit challenge [88].
delay and symmetrical routing to increase the uniqueness This design introduces a delay before and after the third MUX
with four flip-flops and three MUXes in place of a single using a D-FF with feedback. Two configurations have been
MUX structure in APUF [86], [87]. The design reduces proposed, the first with three challenges as input and the
resource utilization significantly since the number of chal- second with only one challenge as input. The author verifies
lenges is increased three times compared to the conventional the uniqueness in Spartan-3 and Virtex-6 FPGA boards for
outputs of the APUF based on knowledge of the challenges In the last few decades, adaptations of the XOR function in
and responses. the design of APUF compositions have become inevitable for
enhanced security due to the increased computational com-
V. MODELING ATTACK plexity. Reference [115] has experimentally verified that an
Software modeling builds a numerical model of PUF using exponential increase of XOR function enhances the rigidity
a computer algorithm with knowledge of datasets. In non- of XOR PUFs against attack, however, trading-off reliability
invasive attacks of APUF, presume that Bob, an adversary for the resource. Interestingly, Tobisch and Becker [46], [95]
has obtained a few sets of CRPs and the adversary can design invalidate this claim by performing a cloning attack on a com-
a numerical model with delay value and CRPs. In that case, mercially available RFID tag with a 4-way XOR PUF model
developing the PUF model is possible, which is subjective to using divide and conquer approach in the Reliability-based
ML attacks. CMA-ES and LR with R-prop algorithm. Reference [116]
Mathematical modeling of APUF, XOR APUF, and finds ML attacks still successful while using obfuscated
LSPUF [115] have been discussed in brief under this section. response bits by extracting the necessary information from
padded strings and helper data. CMA-ES has been used to
A. MATHEMATICAL MODELING OF APUF attack Slender PUF and reverse fuzzy extractor-based proto-
The linear delay additive model is used to design the APUF. cols that use PUF to create secret keys in [116]. It emphasizes
The final delay difference (1) between the top and bottom the need for protocols to be robust enough. Recent research
paths for an n-bit APUF can be expressed as, focuses on using Deep Learning (DL) [117], [118], genetic
programming [119], and ANN [120], [121] based techniques
1=w
⃗ T φ.
⃗ (20) to model the design with reduced error and improved predic-
The parameter vector w ⃗ and feature vector φ⃗ are of n + 1 tion accuracy of 64-bit and 128-bit CRPs.
dimensions. The vector w ⃗ includes the delays from all the
multiplexer components in the APUF stages. The feature D. MODELING ATTACK ON APUF
vector φ⃗ is a function of the input challenges. The response APUF remains the focus of most modeling attacks since
(R) of APUF is dependent on the sign of 1. The response it is the primary building block for analyzing attacks on
R = −1 when the APUF output is 0 or else, R = 1. APUF variants. Non-invasive, semi-invasive, and mathemati-
cal modeling attacks are used to extract the CRPs from APUF.
⃗ T φ).
R = sgn(1) = sgn(w ⃗ (21)
1) SIDE-CHANNEL ATTACK
B. MATHEMATICAL MODELING OF XOR APUF
Side-channel attack (SCA) is one of the most prominent
The XOR APUF is modeled with m APUFs in parallel, each
non-invasive attacks used to determine the secret key from
consisting of n stages. A set of similar challenges are applied
a PUF model [122], [123]. For every input and output in
to all the APUF instances, and their responses are XOR-ed to
the PUF design, FPGA implementation employs a register.
generate a final response. Mathematically, the response from
These registers serve as the data source for the power trace
each instance can be given as Ri ϵ {−1, 1}. Hence, Qfor an analysis. SCA depends on the architecture of PUF as well
m-XOR APUF, the final response becomes RXOR = m i=1 Ri . as the pseudo-random functions. In [123], using correlation
The mathematical model with the parameters and feature
power analysis, SCA is performed on LSPUF to collect the
vector of m-XOR APUF is written as,
CRPs. Two approaches were focused on the register that
m
Y stores the result of the XOR operation. The first method
RXOR = ⃗ Tl φ⃗l ).
sgn(w (22) recovers the hamming weight of the targeted register, and
i=1
the second obtains the difference of mean-based Differential
C. MATHEMATICAL MODELING OF LSPUF Power Analysis (DPA).
The LSPUF is also similar to m-XOR APUF, with the dif-
ference in introducing the challenges. As mentioned in Sec- 2) PHOTONIC EMISSION AND LASER-BASED TECHNIQUES
tion IV, the challenges to the LSPUF are delivered in a These techniques collect the CRPs from the FPGA using pho-
circular shift, and the output bits are XOR-ed to generate a tonic emission [124], and fault injection [125] from individ-
multi-bit output response denoted as out1 , out2 , .., outj . This ual APUF instances. An intrusive attack on the APUF [126]
approach can challenge the adversaries in extracting the exact successfully detects the CRPs with a high-resolution time
single-bit output. of 6 ps and assists in determining the internal timing delay
The design parameters for LSPUF are (i) the number of between each stage. This analysis also demonstrates that
output bits (r), (ii) the values that affect the single output bit APUF can be modeled even without a minimal number of
response (l), and (iii) the circular shift in choosing l values. CRPs. This technique measures the time delay between the
For n = 1, 2, . . . , j, enabled signal and photon emission at the output of the
final stage for each APUF occurrence. The authors of [126]
outn = ⊕i=1,2,...l resp(n+cs+i)mod m . (23) experimentally evaluated their findings by applying the
photonic emission on the rear side of the 180 nm Altera FPGA efficiently modeled the x-XOR PUF (x ≤ 9) [131], [132],
board. [133], [134], [135], and the LR approach is successful in
obtaining the entire CRPs [114], [115]. YU and Wen [136]
3) CRYPTANALYSIS ATTACK propose a novel hybrid ML attack model on XOR APUF
It is known that cryptanalysis and modeling attacks are using CNN and side-channel analysis. As CNN did not effec-
the two standard mathematical methodologies employed for tively extract the critical correlation between the N input
examining the security of PUFs. In the domain of PUF, challenge bits of the XOR APUF, SCA has been integrated
cryptanalysis refers to computational attacks that use CRPs to pre-process the challenge. Later, the correlated challenge
and PUF design attributes to determine the response and enters the CNN, which significantly raises the training accu-
they don’t require a mathematical model explicitly declared. racy to 98% [136]. Generally, XOR APUF employs the same
Although a strong key is determined utilizing fuzzy extractors challenges for all the APUF instances. The literature study
and error-correcting codes, [96] and [127] successfully model reveals that CDC-XPUF variants with different challenges for
the composite PUF using a cryptanalysis approach. different APUF instances have lower resilience against mod-
eling attacks [91]. CDC-XPUF [91], [137] employs different
challenges for each APUF instance in contrast to XOR APUF.
4) PREDICTABILITY TEST
The author has modeled the CDC-x-XPUF with x(3, 4, 5)
The unpredictable nature of CRPs is the quintessential feature
and demonstrated for x > 5. However, it fails to model the
expected from a PUF. Hamming Distance Test (HDT (t))
PUF with a training size of 100 million using four-layer, No-
and Propagation Criteria (PC(t)) are two of the few unpre-
Neuron, and LR with R-prop.
dictability tests used to validate the APUF variants, viz., XOR
APUF, LSPUF, and Composite PUF [128]. These tests esti-
mate the likelihood of output transition probability to evaluate F. MODELING ATTACK ON DAPUF
the t flipping bits due to the challenge pairs(Chi , Chj ) with The DAPUF (3-1 and 4-1) [34] has been proven significantly
HD(Chi , Chj ) = t and HD(Chi , Chj ) ≤ t. Reference [128] more resilient against modeling attacks by using SVMlight .
proves that the said testing schemes are insufficient to test the With 1000 CRPs given to the SVM for testing, the prediction
unpredictability and incorporate a new parameter (flipping bit rate was reduced to 57% compared with APUF. The CRPs
pattern vector e) to HDT . The adversary finds fewer chances are then increased to 17 million to model the DAPUF using
to rebuild the model if the value of HDT (e, t)=0.5. LR [118]. This technique has modeled the 2-1 DAPUF albeit
with increased complexity while applying it to 3-1 and 4-1
E. MODELING ATTACK ON XOR APUF DA-APUF. Though 3-1 DAPUF has been modeled with an
In [129] and [130], x-XOR PUF (x ≤ 6) is demonstrated to accuracy of 86%, modeling 4-1 DAPUF has not been suc-
be robust against attacks since it takes more computational cessful. On the other hand, the DL technique has effectively
time to achieve the final response. However, there exists managed to model the 3-1 and 4-1 DAPUF with 1 million
a significant correlation between the challenges assigned CRPs [118], posing a threat to PUF design. In [138], the
randomly to any one of the APUF components. CMA-ES authors have used Multilayer Perceptron (MLP) neural net-
algorithm [95], thus utilizes these correlated values along work with an Adaptive Moment Estimation optimizer [139]
with a divide and conquer attack to build each component and ReLU (activation function for hidden layers) to build
of APUF. The application of the neural network method has the XOR APUF and DAPUF. A comparatively reduced
CRPs around 500 × 103 is used to model N XOR APUF and one at the output has been used to model the FF-APUF
(N = 2,3,4) and DAPUF (2-1, 3-1, and 4-1) and has achieved (64 and 128-bit) with varying lengths, l (1≤ l ≤ 6). The
an accuracy of around 80% for 4-1 DAPUF. For 1 mil- maximum training time to model was 374.7134 minutes and
lion CRPs, the accuracy was reported to be 81% for 4-1 324.0204 min with 200 × 103 CRPs for 64 and 128-bit
DAPUF. Hence, it is more claimed that among XOR APUF challenges (l-6), respectively. The training time was reduced
(N = 2,3,4) and DAPUF (2-1, 3-1, and 4-1), 4-1 DAPUF to 73 minutes for 1 million CRPs with ten loops by combining
has proved robust to modeling attacks with lower prediction additional bits (ghost bits) in [121] along with challenge bits
accuracy. to FF-APUF and XOR APUF using the above neural network
method.
G. MODELING ATTACK ON FEED-FORWARD APUF
Feed-Forward APUF is considered robust against modeling H. MODELING ATTACK ON LSPUF
attacks as the number of loops increases in N stage APUF The responses from the LSPUF have a significant degree of
with l-loops of feed-forward arbiter. FF-APUF [129] mod- entropy due to the obfuscated CRPs. For x > 6 [115], the
eled with the same number of loops achieved a prediction LSPUF is resilient to LR-based modeling. However, while
accuracy of about 95% for l ≥ 6 loops. The MLP neural adopting parallel implementation, it failed for x = 9 [46],
network [120] with three layers of the neuron at the input [95]. In [128], the modeling of y-XOR PUF helped to model
the x-XOR PUF (y < x), thus reducing the time and data • Robustness:APUFs can be designed to be resistant to
complexity even without side-channel analysis. Furthermore, tampering and against attempts to reverse engineer the
obtaining CRPs is found indeed successful using SCA [124] response. This feature improves the security of the
and cryptanalysis [96]. PUF.
The factors that need to be considered while designing
I. MODELING ATTACK ON iPUF APUF include the delay difference, placement, and routing
Reference [117] uses the gradient-based numerical optimiza- of the switch blocks, size of the PUF model, cost, power
tion method to model the iPUF (4,4) with a training time of requirements, the execution time, and the compatibility of
5.23 minutes. This method uses the knowledge of parity vec- the APUF with the manufacturing process of the device in
tors obtained from the challenge. The challenges have been which it is being used. Factors that can influence the com-
collected using MATLAB simulation models and Rectified position of an APUF include the desired level of security,
Linear Unit (ReLU) as an activation function for learn- the size and complexity of the device, and the resources
ing mapping and patterns of the dataset. Probably Approx- available for implementing the PUF. Considering the above
imately Correct (PAC) [140], the sub-space pre-learning discussions, the APUF can be used securely for IP pro-
method [141] uses randomness and known CRPs to model tection, IoT device authentication, Internet of Vehicles, and
the iPUF. The uniformity metric is found helpful in splitting resource-constrained applications such as RFIDs and smart
the iPUF (4,4) [50], [117] applying LR. The latest technique cards.
employs the splitting attack [114] using the divide and con- As PUF technology evolves, there are several areas in
quer ML algorithm for 64-bit iPUF (8,8), and (1,9) with a which future research on APUFs could focus on improving
training size ranging between 300 million to 750 million their performance and capabilities. Typical directions can be
CRPs, and the prediction accuracy was near 95%. as follows:
Table 5 summarizes the modeling attack conducted by • Developing methods that will further strengthen the
respective authors on various APUF variants to understand confidentiality of APUFs against tampering and reverse
their resiliency against attacks for different machine-learning engineering.
techniques. One can easily model an attack on a conventional • Investigating measures to increase the number of possi-
APUF because of its linear additive model using LR, DL, ble CRPs and further improve the uniqueness of APUFs.
and fault injection with reduced time and prediction accuracy • Developing new fabrication techniques to lower the cost
of 99.9%. Adding APUF instances parallelly in the DAPUF of APUFs, to enable their integration into a broader
increases the computation time by reducing the prediction range of devices.
accuracy between 71% and 95% with increased CRPs. Simi- • Reduce the power consumption of APUFs, to make
larly, the XOR APUF and FFAPUF increase the training time them more suitable for low-power and battery-powered
to predict its random output as the parallel instances of APUF, devices.
the number of XOR and feed-forward loops are increased in • Integrate APUFs with other security features, such as
the design model. Thus, XOR APUF, FF-APUF, and iPUF secure communication protocols, to provide an addi-
are challenging to get modeled in machine learning because tional layer of protection.
they are designed to be unpredictable and exhibit high vari- • Investigate the robustness of PUFs against physical
ability in their outputs. This makes it difficult for a machine attacks such as differential power analysis, electromag-
learning model to accurately predict the response of an XOR netic analysis, and side-channel analysis.
APUF, FFAPUF, and iPUF, as the model needs to account for
many possible input combinations and corresponding output REFERENCES
values. [1] A. Babaei and G. Schiele, ‘‘Physical unclonable functions in the Internet
of Things: State of the art and open challenges,’’ Sensors, vol. 19, no. 14,
p. 3208, Jul. 2019, doi: 10.3390/s19143208.
VI. CONCLUSION AND FUTURE SCOPE [2] W. Liang, S. Xie, J. Long, K.-C. Li, D. Zhang, and K. Li, ‘‘A double PUF-
The Arbiter PUF, being a strong PUF in nature, operates on based RFID identity authentication protocol in service-centric Internet of
Things environments,’’ Inf. Sci., vol. 503, pp. 129–147, Dec. 2019, doi:
the delay difference incurred due to the intrinsic manufac- 10.1016/j.ins.2019.06.047.
turing variations, thus possessing an exponential number of [3] A. Shamsoshoara, A. Korenda, F. Afghah, and S. Zeadally, ‘‘A survey on
CRPs, which makes it more suitable for authentication in physical unclonable function (PUF)-based security solutions for Internet
of Things,’’ Comput. Netw., vol. 183, Dec. 2020, Art. no. 107593, doi:
several applications. The APUF is well suited for low-weight 10.1016/j.comnet.2020.107593.
applications since the resource utilization is much lower [4] C. Herder, M.-D. Yu, F. Koushanfar, and S. Devadas, ‘‘Physical unclon-
compared to other strong PUFs. Some of the key benefits of able functions and applications: A tutorial,’’ Proc. IEEE, vol. 102, no. 8,
pp. 1126–1141, Aug. 2014, doi: 10.1109/JPROC.2014.2320516.
APUFs include the following:
[5] B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, ‘‘Silicon physical
• Ease of implementation: APUFs can be implemented random functions,’’ in Proc. ACM Conf. Comput. Commun. Secur., 2002,
using standard digital logic gates. pp. 148–160, doi: 10.1145/586131.586132.
• High degree of variability: APUFs can generate a [6] B. Gassend, D. Lim, D. Clarke, M. van Dijk, and S. Devadas, ‘‘Iden-
tification and authentication of integrated circuits,’’ Concurrency Com-
large number of possible CRPs, which can improve the put., Pract. Exper., vol. 16, no. 11, pp. 1077–1098, Sep. 2004, doi:
uniqueness of the PUF. 10.1002/cpe.805.
[7] H. Ning, F. Farha, A. Ullah, and L. Mao, ‘‘Physical unclonable func- [26] Y. Hori, T. Yoshida, T. Katashita, and A. Satoh, ‘‘Quantitative and statis-
tion: Architectures, applications and challenges for dependable security,’’ tical performance evaluation of arbiter physical unclonable functions on
IET Circuits, Devices Syst., vol. 14, no. 4, pp. 407–424, Jul. 2020, doi: FPGAs,’’ in Proc. Int. Conf. Reconfigurable Comput. FPGAs, Dec. 2010,
10.1049/iet-cds.2019.0175. pp. 298–303, doi: 10.1109/ReConFig.2010.24.
[8] B. Gassend, ‘‘Physical random functions,’’ M.S. thesis, Dept. Elect. [27] A. Maiti, V. Gunreddy, and P. Schaumont, ‘‘A systematic method to
Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, evaluate and compare the performance of physical unclonable functions,’’
Jan. 2003. IACR Cryptol. ePrint Arch., vol. 2011, p. 657, 2011.
[9] Z. Cherif, J.-L. Danger, S. Guilley, and L. Bossuet, ‘‘An easy-to- [28] A. Sadr and M. Zolfaghari-Nejad, ‘‘Weighted Hamming distance for PUF
design PUF based on a single oscillator: The loop PUF,’’ in Proc. performance evaluation,’’ Electron. Lett., vol. 49, no. 22, pp. 1376–1378,
15th Euromicro Conf. Digit. Syst. Design, Sep. 2012, pp. 156–162, doi: Oct. 2013, doi: 10.1049/el.2013.2326.
10.1109/DSD.2012.22. [29] M. Kaur, R. Rashidzadeh, and R. Muscedere, ‘‘Reliability of physical
[10] M. Gao, K. Lai, and G. Qu, ‘‘A highly flexible ring oscillator PUF,’’ unclonable function under temperature and supply voltage variations,’’
in Proc. 51st Annu. Design Autom. Conf., Jun. 2014, pp. 1–6, doi: Midwest Symp. Circuits Syst., vol. 2018, pp. 1008–1011, Aug. 2019, doi:
10.1145/2593069.2593072. 10.1109/MWSCAS.2018.8623849.
[11] Q. Chen, G. Csaba, P. Lugli, U. Schlichtmann, and U. Ruhrmair, [30] Y. Su, J. Holleman, and B. P. Otis, ‘‘A digital 1.6 pJ/bit chip identification
‘‘The bistable ring PUF: A new architecture for strong physical circuit using process variations,’’ IEEE J. Solid-State Circuits, vol. 43,
unclonable functions,’’ in Proc. IEEE Int. Symp. Hardw.-Oriented no. 1, pp. 69–77, Jan. 2008, doi: 10.1109/JSSC.2007.910961.
Secur. Trust, San Diego, CA, USA, Jun. 2011, pp. 134–141, doi: [31] C. Gu, W. Liu, N. Hanley, R. Hesselbarth, and M. O’Neill, ‘‘A theoret-
10.1109/HST.2011.5955011. ical model to link uniqueness and min-entropy for PUF evaluations,’’
[12] Q. Wang, M. Gao, and G. Qu, ‘‘A machine learning attack resistant dual- IEEE Trans. Comput., vol. 68, no. 2, pp. 287–293, Feb. 2019, doi:
mode PUF,’’ in Proc. Great Lakes Symp. VLSI, May 2018, pp. 177–182, 10.1109/TC.2018.2866241.
doi: 10.1145/3194554.3194590. [32] D. P. Sahoo, R. S. Chakraborty, and D. Mukhopadhyay, ‘‘Towards ideal
[13] J. Zhang, C. Shen, Z. Guo, Q. Wu, and W. Chang, ‘‘CT PUF: Configurable arbiter PUF design on Xilinx FPGA: A practitioner’s perspective,’’ in
tristate PUF against machine learning attacks for IoT security,’’ IEEE Proc. Euromicro Conf. Digit. Syst. Design, Aug. 2015, pp. 559–562, doi:
Internet Things J., vol. 9, no. 16, pp. 14452–14462, Aug. 2022, doi: 10.1109/DSD.2015.51.
10.1109/JIOT.2021.3090475. [33] T. Machida, D. Yamamoto, M. Iwamoto, and K. Sakiyama, ‘‘Implemen-
[14] S. Hemavathy and V. S. K. Bhaaskaran, ‘‘Design and analysis of tation of double arbiter PUF and its performance evaluation on FPGA,’’
secure quasi-adiabatic tristate physical unclonable function,’’ IEEE Con- in Proc. 20th Asia South Pacific Design Autom. Conf., Jan. 2015, pp. 6–7,
sum. Electron. Mag., vol. 11, no. 4, pp. 109–114, Jul. 2021, doi: doi: 10.1109/ASPDAC.2015.7058919.
10.1109/MCE.2021.3117541. [34] T. Machida, D. Yamamoto, M. Iwamoto, and K. Sakiyama, ‘‘A new arbiter
[15] S. Hemavathy and V. S. K. Bhaaskaran, ‘‘Design and analysis of secure PUF for enhancing unpredictability on FPGA,’’ Sci. World J., vol. 2015,
quasi-adiabatic tristate physical unclonable function,’’ in Proc. IEEE pp. 1–13, Jan. 2015, doi: 10.1155/2015/864812.
Int. Symp. Smart Electron. Syst. (iSES), Dec. 2020, pp. 109–114, doi:
[35] T. Machida, D. Yamamoto, M. Iwamoto, and K. Sakiyama, ‘‘A new mode
10.1109/ISES50453.2020.00034.
of operation for arbiter PUF to improve uniqueness on FPGA,’’ in Proc.
[16] Z. Zulfikar, N. Soin, S. F. W. M. Hatta, M. S. A. Talip, and A. Jaafar,
Ann. Comput. Sci. Inf. Syst., Sep. 2014, pp. 871–878.
‘‘Routing density analysis of area-efficient ring oscillator physically
[36] M. Majzoobi, A. Kharaya, F. Koushanfar, and S. Devadas, ‘‘Automated
unclonable functions,’’ Appl. Sci., vol. 11, no. 20, p. 9730, Oct. 2021, doi:
design, implementation, and evaluation of arbiter-based PUF on FPGA
10.3390/app11209730.
using programmable delay lines,’’ IACR Cryptol. ePrint Arch., vol. 2014,
[17] D. E. Holcomb, W. P. Burleson, and K. Fu, ‘‘Power-up SRAM state
p. 639, 2014. [Online]. Available: http://eprint.iacr.org/2014/639
as an identifying fingerprint and source of true random numbers,’’
IEEE Trans. Comput., vol. 58, no. 9, pp. 1198–1210, Sep. 2009, doi: [37] P. H. Nguyen, D. P. Sahoo, C. Jin, K. Mahmood, U. Rührmair,
10.1109/TC.2008.212. and M. Van Dijk, ‘‘The interpose PUF: Secure PUF design against
[18] F. Tehranipoor, N. Karimian, W. Yan, and J. A. Chandy, ‘‘DRAM- state-of-the-art machine learning attacks,’’ IACR Trans. Cryptograph.
based intrinsic physically unclonable functions for system-level Hardw. Embedded Syst., vol. 2019, no. 4, pp. 243–290, Aug. 2019, doi:
security and authentication,’’ IEEE Trans. Very Large Scale Integr. 10.13154/tches.v2019.i4.243-290.
(VLSI) Syst., vol. 25, no. 3, pp. 1085–1097, Mar. 2017, doi: [38] J. Yang, X. Yu, and R. Wei, ‘‘A low resource consumption arbiter
10.1109/TVLSI.2016.2606658. PUF improved switch component design for FPGA,’’ J. Phys., Conf.
[19] S. Hemavathy and V. S. K. Bhaaskaran, ‘‘Double edge-triggered tristate Ser., vol. 2221, no. 1, May 2022, Art. no. 012011, doi: 10.1088/1742-
flip-flop physical unclonable function for secure IoT ecosystem,’’ in Proc. 6596/2221/1/012011.
IEEE Int. Symp. Smart Electron. Syst. (iSES), Dec. 2021, pp. 44–47, doi: [39] E. Ozturk, G. Hammouri, and B. Sunar, ‘‘Physical unclonable function
10.1109/ISES52644.2021.00022. with tristate buffers,’’ in Proc. IEEE Int. Symp. Circuits Syst., May 2008,
[20] U. RÃührmair and D. E. Holcomb, ‘‘PUFs at a glance,’’ in Proc. pp. 3194–3197, doi: 10.1109/ISCAS.2008.4542137.
Design, Automat. Test Eur. Conf. Exhib. (DATE), Mar. 2014, pp. 1–6, doi: [40] M. H. Mahalat, S. Mandal, A. Mondal, and B. Sen, ‘‘An efficient
10.7873/DATE2014.360. implementation of arbiter PUF on FPGA for IoT application,’’ in Proc.
[21] U. Rührmair, J. Sölter, and F. Sehnke, ‘‘On the foundations of physical 32nd IEEE Int. Syst.-Chip Conf. (SOCC), Sep. 2019, pp. 324–329, doi:
unclonable functions,’’ IACR Cryptol. ePrint Arch., vol. 2009, p. 277, 10.1109/SOCC46988.2019.1570548268.
2009. [41] C. W. Lin and S. Ghosh, ‘‘A family of Schmitt-Trigger-based arbiter-
[22] Y. Guo, T. Dee, and A. Tyagi, ‘‘Multi-block APUF with 2-level PUFs and selective challenge-pruning for robustness and quality,’’ in
voltage supply,’’ in Proc. IEEE Comput. Soc. Annu. Symp. VLSI Proc. IEEE Int. Symp. Hardw. Oriented Secur. Trust (HOST), May 2015,
(ISVLSI), Jul. 2018, pp. 327–332, doi: 10.1109/ISVLSI.2018. pp. 32–37, doi: 10.1109/HST.2015.7140232.
00067. [42] C. Aknesil and E. Dubrova, ‘‘An FPGA implementation of 4×4 arbiter
[23] D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, PUF,’’ in Proc. Int. Symp. Mult. Log., May 2021, pp. 160–165, doi:
‘‘Extracting secret keys from integrated circuits,’’ IEEE Trans. Very Large 10.1109/ISMVL51352.2021.00035.
Scale Integr. (VLSI) Syst., vol. 13, no. 10, pp. 1200–1205, Oct. 2005, doi: [43] J. Zhou, ‘‘FPGA oriented design method of adjustable arbiter physical
10.1109/TVLSI.2005.859470. unclonable circuit,’’ J. Phys., Conf. Ser., vol. 1449, no. 1, Jan. 2020,
[24] Z. C. Jouini, J.-L. Danger, and L. Bossuet, ‘‘Performance Art. no. 012060, doi: 10.1088/1742-6596/1449/1/012060.
evaluation of physically unclonable function by delay statistics,’’ [44] L. Lin, D. Holcomb, D. K. Krishnappa, P. Shabadi, and W. Burleson,
in Proc. IEEE 9th Int. New Circuits Syst. Conf., Bordeaux, ‘‘Low-power sub-threshold design of secure physical unclonable func-
France, Jun. 2011, pp. 482–485, doi: 10.1109/NEWCAS.2011. tions,’’ in Proc. 16th ACM/IEEE Int. Symp. Low Power Electron. Design,
5981324. Aug. 2010, pp. 43–48, doi: 10.1145/1840845.1840855.
[25] Y. Hori, H. Kang, T. Katashita, A. Satoh, S. Kawamura, and K. Kobara, [45] L. Lin, S. Srivathsa, D. K. Krishnappa, P. Shabadi, and W. Burleson,
‘‘Evaluation of physical unclonable functions for 28-nm process field- ‘‘Design and validation of arbiter-based PUFs for sub-45-nm low-power
programmable gate arrays,’’ J. Inf. Process., vol. 22, no. 2, pp. 344–356, security applications,’’ IEEE Trans. Inf. Forensics Security, vol. 7, no. 4,
2014, doi: 10.2197/ipsjjip.22.344. pp. 1394–1403, Aug. 2012, doi: 10.1109/TIFS.2012.2195174.
[46] J. Tobisch and G. T. Becker, ‘‘On the scaling of machine learning attacks [64] Y. Yilmaz, S. R. Gunn, and B. Halak, ‘‘Lightweight PUF-based
on PUFs with application to noise bifurcation,’’ in Radio Frequency authentication protocol for IoT devices,’’ Proc. IEEE 3rd Int.
Identification (Lecture Notes in Computer Science), vol. 9440. New Verification Secur. Workshop (IVSW), Jul. 2018, pp. 38–43, doi:
York, NY, USA: Springer, Jun. 2015, pp. 17–31, doi: 10.1007/978-3-319- 10.1109/IVSW.2018.8494884.
24837-0_2. [65] J. Zhang and C. Shen, ‘‘Set-based obfuscation for strong PUFs against
[47] Z. Cherif, J.-L. Danger, F. Lozac’h, Y. Mathieu, and L. Bossuet, ‘‘Eval- machine learning attacks,’’ IEEE Trans. Circuits Syst. I, Reg. Papers,
uation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA,’’ vol. 68, no. 1, pp. 288–300, Jan. 2021, doi: 10.1109/TCSI.2020.3028508.
in Proc. 2nd Int. Workshop Hardw. Architectural Support Secur. Privacy, [66] M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas,
Jun. 2013, pp. 1–8. ‘‘Slender PUF protocol: A lightweight, robust, and secure authentication
[48] D. P. Sahoo, P. H. Nguyen, R. S. Chakraborty, and by substring matching,’’ in Proc. IEEE Symp. Secur. Privacy Workshops,
D. Mukhopadhyay, ‘‘Architectural bias: A novel statistical metric May 2012, pp. 33–44, doi: 10.1109/SPW.2012.30.
to evaluate arbiter PUF variants,’’ IACR Cryptol. ePrint Arch., [67] M.-D. Yu, D. M’Raihi, I. Verbauwhede, and S. Devadas, ‘‘A noise bifurca-
vol. 2016, p. 57, Jan. 2016. [Online]. Available: http://dblp.uni- tion architecture for linear additive physical functions,’’ in Proc. IEEE Int.
trier.de/db/journals/iacr/iacr2016.html#SahooNCM16 Symp. Hardw.-Oriented Secur. Trust (HOST), May 2014, pp. 124–129,
[49] D. P. Sahoo, P. H. A. Nguyen, and R. S. Chakraborty. (2018). On doi: 10.1109/HST.2014.6855582.
the Architectural Analysis of Arbiter Delay PUF Variants. [Online]. [68] M.-D. Yu, M. Hiller, J. Delvaux, R. Sowell, S. Devadas, and
Available: http://dblp.uni-trier.de/db/journals/iacr/iacr2016.html# I. Verbauwhede, ‘‘A lockdown technique to prevent machine learn-
SahooNCM16 ing on PUFs for lightweight authentication,’’ IEEE Trans. Multi-
[50] A. Aghaie and A. Moradi, ‘‘Inconsistency of simulation and prac- Scale Comput. Syst., vol. 2, no. 3, pp. 146–159, Jul./Sep. 2016, doi:
tice in delay-based strong PUFs,’’ IACR Trans. Cryptograph. Hardw. 10.1109/TMSCS.2016.2553027.
Embedded Syst., vol. 2021, no. 3, pp. 520–551, Jul. 2021, doi: [69] Z. He, W. Chen, L. Zhang, G. Chi, Q. Gao, and L. Harn, ‘‘A highly
10.46586/tches.v2021.i3.520-551. reliable arbiter PUF with improved uniqueness in FPGA implementation
[51] J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, using bit-self-test,’’ IEEE Access, vol. 8, pp. 181751–181762, 2020, doi:
‘‘A technique to build a secret key in integrated circuits for identification 10.1109/ACCESS.2020.3028514.
and authentication applications,’’ in Symp. VLSI Circuits, Dig. Tech. [70] Y. Gao, H. Ma, S. F. Al-Sarawi, D. Abbott, and D. C. Ranasinghe,
Papers, Jun. 2004, pp. 176–179, doi: 10.1109/VLSIC.2004.1346548. ‘‘PUF-FSM: A controlled strong PUF,’’ IEEE Trans. Comput.-Aided
[52] G. E. Suh and S. Devadas, ‘‘Physical unclonable functions for device Design Integr. Circuits Syst., vol. 37, no. 5, pp. 1104–1108, May 2017,
authentication and secret key generation,’’ in Proc. 44th ACM/IEEE doi: 10.1109/TCAD.2017.2740297.
[71] J. Kokila and N. Ramasubramanian, ‘‘Enhanced authentication using
Design Automat. Conf., San Diego, CA, USA, 2007, pp. 9–14.
hybrid PUF with FSM for protecting IPs of SoC FPGAs,’’ J. Electron.
[53] S. Chen, B. Li, F. Dan, and J. Chen, ‘‘A machine learning resistant
Test., vol. 35, no. 4, pp. 543–558, Aug. 2019, doi: 10.1007/s10836-019-
arbiter PUFs scheme based on polynomial reconstruction,’’ in Proc. IEEE
05808-w.
2nd Int. Conf. Signal Image Process. (ICSIP), Singapore, Aug. 2017,
[72] A. Spenke, R. Breithaupt, and R. Plaga, ‘‘An arbiter PUF secured by
pp. 465–469, doi: 10.1109/SIPROCESS.2017.8124585.
remote random reconfigurations of an FPGA,’’ in Proc. Int. Conf. Trust
[54] W. Liang, Z. Ning, S. Xie, Y. Hu, S. Lu, and D. Zhang, ‘‘Secure Trustworthy Comput. in Lecture Notes in Computer Science, vol. 9824,
fusion approach for the Internet of Things in smart autonomous 2016, pp. 140–158, doi: 10.1007/978-3-319-45572-3_8.
multi-robot systems,’’ Inf. Sci., vol. 579, pp. 468–482, Jun. 2021, doi: [73] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, and
10.1016/J.INS.2021.08.035. M. Levenson, ‘‘NIST special publication 800–22: A statistical test suite
[55] W. Liang, S. Xie, D. Zhang, X. Li, and K.-C. Li, ‘‘A mutual security for the validation of random number generators and pseudo random
authentication method for RFID-PUF circuit based on deep learning,’’ number generators for cryptographic applications,’’ Nat. Inst. Standards
ACM Trans. Internet Technol., vol. 22, no. 2, pp. 1–20, May 2022, doi: Technol., Gaithersburg, MD, USA, Tech. Rep. 800-22 Rev 1a, 2010.
10.1145/3426968. [74] C. W. O’Donnell, G. E. Suh, and S. Devadas, ‘‘PUF-based random
[56] H. Su, M. Zwolinski, and B. Halak, ‘‘A machine learning attacks resistant number generation,’’ MIT, Cambridge, MA, USA, Tech. Rep., 481, 2004.
two stage physical unclonable functions design,’’ in Proc. IEEE 3rd Int. [75] A. Sadr and M. Zolfaghari-Nejad, ‘‘Physical unclonable function (PUF)
Verification Secur. Workshop (IVSW), Costa Brava, Spain, Jul. 2018, based random number generator,’’ Adv. Comput., Int. J., vol. 3, no. 2,
pp. 52–55, doi: 10.1109/IVSW.2018.8494839. pp. 139–145, 2012, doi: 10.5121/acij.2012.3214.
[57] D. A. Puf, Y. Wang, and Z. Chang, ‘‘Authentication against man-in-the- [76] Y. Yu, E. Dubrova, M. Naslund, and S. Tao, ‘‘On designing PUF-based
middle attack with a time-variant reconfigurable dual-LFSR-based arbiter TRNGs with known answer tests,’’ in Proc. IEEE Nordic Circuits Syst.
PUF,’’ 2020, arXiv:2007.10755. Conf. (NORCAS), NORCHIP Int. Symp. Syst.-Chip (SoC), Oct. 2018,
[58] M. Majzoobi, F. Koushanfar, and M. Potkonjak, ‘‘Techniques for pp. 18–23, doi: 10.1109/NORCHIP.2018.8573489.
design and implementation of secure reconfigurable PUFs,’’ ACM Trans. [77] K. Pratihar, U. Chatterjee, M. Alam, D. Mukhopadhyay, and
Reconfigurable Technol. Syst., vol. 2, no. 1, pp. 1–10, 2009, doi: R. S. Chakraborty, ‘‘A tale of twin primitives: Single-chip solution
10.1145/1502781.1502786. for PUFs and TRNGs,’’ IACR Cryptol. ePrint Arch., vol. 2021, p. 1067,
[59] B. Gassend, M. Van Dijk, D. Clarke, and S. Devadas, ‘‘Controlled phys- Dec. 2021.
ical random functions,’’ in Security With Noisy Data. London, U.K.: [78] M. Ayat, R. E. Atani, and S. Mirzakuchaki, ‘‘On design of PUF-based
Springer, 2007, pp. 235–253, doi: 10.1007/978-1-84628-984-2_14. random number generators,’’ Int. J. Netw. Secur. Appl., vol. 3, no. 3,
[60] J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, ‘‘Physical unclon- pp. 30–40, May 2011, doi: 10.5121/ijnsa.2011.3303.
able functions and public-key crypto for FPGA IP protection,’’ in Proc. [79] A. Maiti, R. Nagesh, A. Reddy, and P. Schaumont, ‘‘Physical unclonable
Int. Conf. Field Program. Log. Appl., Aug. 2007, pp. 189–195, doi: function and true random number generator: A compact and scalable
10.1109/FPL.2007.4380646. implementation,’’ in Proc. 19th ACM Great Lakes Symp. VLSI, May 2009,
[61] T. A. Idriss, H. A. Idriss, and M. A. Bayoumi, ‘‘A lightweight PUF- pp. 425–428, doi: 10.1145/1531542.1531639.
based authentication protocol using secret pattern recognition for con- [80] M. Brookes, ‘‘Extracting secret keys from integrated circuits,’’ IEEE
strained IoT devices,’’ IEEE Access, vol. 9, pp. 80546–80558, 2021, doi: Trans. Circuits Syst. Analog Digit. Signal Process., vol. 47, no. 9,
10.1109/ACCESS.2021.3084903. pp. 930–935, Oct. 2000.
[62] S. S. Zalivaka, A. A. Ivaniuk, and C.-H. Chang, ‘‘Reliable and [81] S. V. S. Avvaru, Z. Zeng, and K. K. Parhi, ‘‘Homogeneous and het-
modeling attack resistant authentication of arbiter PUF in FPGA erogeneous feed-forward XOR physical unclonable functions,’’ IEEE
implementation with trinary quadruple response,’’ IEEE Trans. Inf. Trans. Inf. Forensics Security, vol. 15, pp. 2485–2498, 2020, doi:
Forensics Security, vol. 14, no. 4, pp. 1109–1123, Apr. 2018, doi: 10.1109/TIFS.2020.2968113.
10.1109/TIFS.2018.2870835. [82] Y. Lao and K. K. Parhi, ‘‘Novel reconfigurable silicon physical unclon-
[63] Y. Gao, G. Li, H. Ma, S. F. Al-Sarawi, O. Kavehei, D. Abbott, able functions,’’ in Proc. Workshop Found. Dependable Secure Cyber-
and D. C. Ranasinghe, ‘‘Obfuscated challenge-response: A secure Phys. Syst., 2011, pp. 30–36.
lightweight authentication mechanism for PUF-based pervasive devices,’’ [83] F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, M. Tehranipoor, and D. Forte,
in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, ‘‘Rock’n’roll PUFs: Crafting provably secure PUFs from less secure ones
Sydney, NSW, Australia, Mar. 2016, pp. 1–6, doi: 10.1109/PER- (extended version),’’ J. Cryptograph. Eng., vol. 11, no. 2, pp. 105–118,
COMW.2016.7457162. Jun. 2021, doi: 10.1007/s13389-020-00226-7.
[84] Y. Lao and K. K. Parhi, ‘‘Statistical analysis of MUX-based [102] Y. Cao, W. Zheng, X. Zhao, and C.-H. Chang, ‘‘An energy-
physical unclonable functions,’’ IEEE Trans. Comput.-Aided Design efficient current-starved inverter based strong physical unclonable
Integr. Circuits Syst., vol. 33, no. 5, pp. 649–662, May 2014, doi: function with enhanced temperature stability,’’ IEEE Access, vol. 7,
10.1109/TCAD.2013.2296525. pp. 105287–105297, 2019, doi: 10.1109/ACCESS.2019.2932022.
[85] Y. Wang, C. Wang, C. Gu, Y. Cui, M. O’Neill, and W. Liu, ‘‘A dynamically [103] B. Chen, P. Wang, and G. Li, ‘‘An obfuscated challenge design
configurable PUF and dynamic matching authentication protocol,’’ IEEE for APUF to resist machine learning attacks,’’ in Proc. IEEE 13th
Trans. Emerg. Topics Comput., vol. 10, no. 2, pp. 1091–1104, Apr. 2021, Int. Conf. ASIC (ASICON), Oct. 2019, pp. 3–6, doi: 10.1109/ASI-
doi: 10.1109/TETC.2021.3072421. CON47005.2019.8983648.
[86] C. Gu, W. Liu, Y. Cui, N. Hanley, M. OrNeill, and F. Lombardi, [104] W. Ge, S. Hu, J. Huang, B. Liu, and M. Zhu, ‘‘FPGA implementation of
‘‘A flip-flop based arbiter physical unclonable function (APUF) design a challenge pre-processing structure arbiter PUF designed for machine
with high entropy and uniqueness for FPGA implementation,’’ IEEE learning attack resistance,’’ IEICE Electron. Exp., vol. 17, no. 2, pp. 1–6,
Trans. Emerg. Topics Comput., vol. 9, no. 4, pp. 1853–1866, Oct. 2021, 2020, doi: 10.1587/elex.16.20190670.
doi: 10.1109/TETC.2019.2935465. [105] Q. Ma, C. Gu, N. Hanley, C. Wang, W. Liu, and M. O’Neill, ‘‘A machine
[87] C. Gu, Y. Cui, N. Hanley, and M. O’Neill, ‘‘Novel lightweight learning attack resistant multi-PUF design on FPGA,’’ in Proc. 23rd Asia
FF-APUF design for FPGA,’’ in Proc. 29th IEEE Int. Syst.-Chip Conf. South Pacific Design Autom. Conf. (ASP-DAC), Jan. 2018, pp. 97–104,
(SOCC), Sep. 2016, pp. 75–80, doi: 10.1109/SOCC.2016.7905439. doi: 10.1109/ASPDAC.2018.8297289.
[88] R. Sushma and N. S. Murty, ‘‘Feedback oriented XORed flip-flop [106] Y. Cui, C. Gu, Q. Ma, Y. Fang, C. Wang, M. O’Neill, and W. Liu,
based arbiter PUF,’’ in Proc. Int. Conf. Electr., Electron., Commun., ‘‘Lightweight modeling attack-resistant multiplexer-based multi-PUF
Comput., Optim. Techn. (ICEECCOT), Dec. 2018, pp. 1444–1448, doi: (MMPUF) design on FPGA,’’ Electronics, vol. 9, no. 5, pp. 1–21, 2020,
10.1109/ICEECCOT43722.2018.9001605. doi: 10.3390/electronics9050815.
[89] R. Kumar, S. N. Dhanuskodi, and S. Kundu, ‘‘On manufactur- [107] M. El-hajj, A. Fadlallah, M. Chamoun, and A. Serhrouchni, ‘‘Secure PUF:
ing aware physical design to improve the uniqueness of silicon- Physically unclonable function based on arbiter with enhanced resistance
based physically unclonable functions,’’ in Proc. 27th Int. Conf. VLSI against machine learning (ML) attacks,’’ in Proc. 5th Int. Conf. Sensors
Design 13th Int. Conf. Embedded Syst., Jan. 2014, pp. 381–386, doi: Electron. Instrum., Sep. 2019, pp. 216–220.
10.1109/VLSID.2014.72. [108] C. Gu, N. Hanley, and M. O’Neill, ‘‘Improved reliability of FPGA-
[90] R. Kumar, H. K. Chandrikakutty, and S. Kundu, ‘‘On improving reliability based PUF identification generator design,’’ ACM Trans. Reconfig-
of delay based physically unclonable functions under temperature varia- urable Technol. Syst., vol. 10, no. 3, pp. 1–10, 2017, doi: 10.1145/
tions,’’ in Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust, Jun. 2011, 3053681.
pp. 142–147, doi: 10.1109/HST.2011.5955012. [109] D. P. Sahoo, S. Saha, D. Mukhopadhyay, R. S. Chakraborty, and
[91] K. T. Mursi and Y. Zhuang, ‘‘Experimental examination of component- H. Kapoor, ‘‘Composite PUF: A new design paradigm for physically
differentially-challenged XOR PUF circuits,’’ J. Phys., Conf. Ser., unclonable functions on FPGA,’’ in Proc. IEEE Int. Symp. Hardw.-
vol. 1729, no. 1, Jan. 2021, Art. no. 012006, doi: 10.1088/1742- Oriented Secur. Trust (HOST), May 2014, pp. 50–55.
6596/1729/1/012006. [110] N. Pundir, F. Amsaad, M. Choudhury, and M. Niamat, ‘‘Novel technique
[92] H. Idriss, T. Idriss, and M. Bayoumi, ‘‘A highly reliable dual-arbiter PUF to improve strength of weak arbiter PUF,’’ in Proc. IEEE 60th Int.
for lightweight authentication protocols,’’ in Proc. IEEE Int. Conf. RFID Midwest Symp. Circuits Syst. (MWSCAS), Boston, MA, USA, Aug. 2017,
Technol. Appl. (RFID-TA), Sep. 2017, pp. 248–253, doi: 10.1109/RFID- pp. 1532–1535, doi: 10.1109/MWSCAS.2017.8053227.
TA.2017.8098903. [111] D. Ganta and L. Nazhandali, ‘‘Easy-to-build arbiter physical unclonable
[93] M. S. Mispan, H. Sarkawi, A. Z. Jidin, R. H. Ramlee, and H. M. Nasir, function with enhanced challenge/response set,’’ in Proc. Int. Symp.
‘‘Design and implementation of multiplexed and obfuscated physical Quality Electron. Design (ISQED), Santa Clara, CA, USA, Mar. 2013,
unclonable function,’’ Indonesian J. Electr. Eng. Informat. (IJEEI), vol. 9, pp. 733–738, doi: 10.1109/ISQED.2013.6523692.
no. 1, pp. 91–100, Mar. 2021, doi: 10.11591/ijeei.v9i1.2664. [112] H. Idriss, T. Idriss, P. Williams, and M. Bayoumi, ‘‘Memory-based
[94] D. P. Sahoo, D. Mukhopadhyay, R. S. Chakraborty, and P. H. Nguyen, arbiter PUF: A novel highly reliable and scalable strong PUF design,’’
‘‘A multiplexer-based arbiter PUF composition with enhanced reliabil- in Proc. IEEE 6th World Forum Internet Things (WF-IoT), New Orleans,
ity and security,’’ IEEE Trans. Comput., vol. 67, no. 3, pp. 403–417, LA, USA, Jun. 2020, pp. 1–6, doi: 10.1109/WF-IoT48130.2020.
Mar. 2018, doi: 10.1109/TC.2017.2749226. 9221015.
[95] G. T. Becker, ‘‘The gap between promise and reality: On the insecurity of [113] N. Wisiol, ‘‘Towards attack resilient delay-based strong PUFs,’’
XOR arbiter PUFs,’’ in Proc. Int. Workshop Cryptograph. Hardw. Embed- in Proc. IEEE Int. Symp. Hardw. Oriented Secur. Trust (HOST),
ded Syst., in Lecture Notes in Computer Science, vol. 9293, Sep. 2015, McLean, VA, USA, Jun. 2022, pp. 5–8, doi: 10.1109/HOST54066.2022.
pp. 535–555, doi: 10.1007/978-3-662-48324-4_27. 9839791.
[96] D. P. Sahoo, P. H. Nguyen, D. Mukhopadhyay, and R. S. Chakraborty, [114] N. Wisiol, C. Mühl, N. Pirnay, P. H. Nguyen, M. Margraf, J.-P. Seifert,
‘‘A case of lightweight PUF constructions: Cryptanalysis and M. van Dijk, and U. Rührmair, ‘‘Splitting the interpose PUF:
machine learning attacks,’’ IEEE Trans. Comput.-Aided Design A novel modeling attack strategy,’’ Trans. Cryptograph. Hardw.
Integr. Circuits Syst., vol. 34, no. 8, pp. 1334–1343, Aug. 2015, doi: Embedded Systems, vol. 2020, no. 3, pp. 97–120, 2020, doi:
10.1109/TCAD.2015.2448677. 10.13154/tches.v2020.i3.97-120.
[97] P. H. Nguyen, D. P. Sahoo, C. Jin, K. Mahmood, and M. V. Dijk, [115] U. RÃührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and
‘‘MXPUF: Secure PUF design against state-of-the-art modeling attacks,’’ J. Schmidhuber, ‘‘Modeling attacks on physical unclonable functions,’’
IACR Cryptol. ePrint Arch., vol. 2017, p. 572, Jan. 2017. in Proc. 17th ACM Conf. Comput. Commun. Secur., New York, NY, USA,
[98] D. P. Sahoo, S. Patranabis, D. Mukhopadhyay, and R. S. Chakraborty, 2010, pp. 237–249, doi: 10.1145/1866307.1866335.
‘‘Fault tolerant implementations of delay-based physically unclonable [116] G. T. Becker, ‘‘On the pitfalls of using arbiter-PUFs as building blocks,’’
functions on FPGA,’’ in Proc. Workshop Fault Diagnosis IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 34, no. 8,
Tolerance Cryptogr. (FDTC), 2016, pp. 87–101, doi: 10.1109/ pp. 1295–1307, Aug. 2015.
FDTC.2016.10. [117] P. Santikellur, A. Bhattacharyay, and R. S. Chakraborty, ‘‘Deep learning
[99] M. Majzoobi, F. Koushanfar, and M. Potkonjak, ‘‘Lightweight secure based model building attacks on arbiter PUF compositions,’’ IACR Cryp-
PUFs,’’ in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design, Nov. 2008, tol. ePrint Arch., vol. 2019, p. 566, 2019.
pp. 670–673, doi: 10.1109/ICCAD.2008.4681648. [118] M. Khalafalla and C. Gebotys, ‘‘PUFs deep attacks: Enhanced mod-
[100] S. S. Zalivaka, A. A. Ivaniuk, and C.-H. Chang, ‘‘FPGA implementation eling attacks using deep learning techniques to break the secu-
of modeling attack resistant arbiter PUF with enhanced reliability,’’ in rity of double arbiter PUFs,’’ in Proc. Design, Autom. Test Eur.
Proc. 18th Int. Symp. Quality Electron. Design (ISQED), Mar. 2017, Conf. Exhib. (DATE), Florence, Italy, Mar. 2019, pp. 204–209, doi:
pp. 313–318, doi: 10.1109/ISQED.2017.7918334. 10.23919/DATE.2019.8714862.
[101] S. S. Zalivaka, A. A. Ivaniuk, and C.-H. Chang, ‘‘Low-cost fortifica- [119] R. S. Chakraborty, R. R. Jeldi, I. Saha, and J. Mathew, ‘‘Binary deci-
tion of arbiter PUF against modeling attack,’’ in Proc. IEEE Int. Symp. sion diagram assisted modeling of FPGA-based physically unclonable
Circuits Syst. (ISCAS), May 2017, pp. 1–4, doi: 10.1109/ISCAS.2017. function by genetic programming,’’ IEEE Trans. Comput., vol. 66, no. 6,
8050671. pp. 971–981, Jun. 2017, doi: 10.1109/TC.2016.2603498.
[120] M. S. Alkatheiri and Y. Zhuang, ‘‘Towards fast and accurate machine [137] G. Li, K. T. Mursi, A. O. Aseeri, M. S. Alkatheiri, and Y. Zhuang, ‘‘A new
learning attacks of feed-forward arbiter PUFs,’’ in Proc. IEEE security boundary of component differentially challenged XOR PUFs
Conf. Dependable Secure Comput., Aug. 2017, pp. 181–187, doi: against machine learning modeling attacks,’’ Int. J. Comput. Netw. Com-
10.1109/DESEC.2017.8073845. mun., vol. 14, no. 3, pp. 1–15, May 2022, doi: 10.5121/ijcnc.2022.14301.
[121] Y. Zhuang, K. T. Mursi, and L. Gaoxiang, ‘‘A challenge obfuscating [138] M. A. Alamro, K. T. Mursi, Y. Zhuang, A. O. Aseeri, and M. S. Alkatheiri,
interface for arbiter PUF variants against machine learning attacks,’’ ‘‘Robustness and unpredictability for double arbiter PUFs on silicon
2021, arXiv:2103.12935. data: Performance evaluation and modeling accuracy,’’ Electronics, vol. 9,
[122] U. Rührmair, X. Xu, J. Sölter, A. Mahmoud, M. Majzoobi, F. Koushanfar, no. 5, p. 870, May 2020, doi: 10.3390/electronics9050870.
and W. Burleson, ‘‘Efficient power and timing side channels for phys- [139] D. P. Kingma and J. L. Ba, ‘‘Adam: A method for stochastic optimiza-
ical unclonable functions,’’ in Cryptographic Hardware and Embedded tion,’’ in Proc. 3rd Int. Learn. Represent., 2015, pp. 1–15.
Systems, vol. 8731. Berlin, Germany: Springer, 2014, pp. 476–492, doi: [140] D. Chatterjee, D. Mukhopadhyay, and A. Hazra, ‘‘Interpose PUF can be
10.1007/978-3-662-44709-3_26. PAC learned,’’ IACR Cryptol. ePrint Arch., vol. 2020, p. 471, 2020.
[123] D. P. Sahoo, P. H. Nguyen, D. B. Roy, D. Mukhopadhyay, and [141] G. Li and K. T. Mursi, ‘‘A subspace pre-learning strategy to break
R. S. Chakraborty, ‘‘Side channel evaluation of PUF-based pseudoran- the interpose PUF,’’ Electronics, vol. 11, no. 7, pp. 1–10, 2022, doi:
dom permutation,’’ in Proc. Euromicro Conf. Digit. Syst. Design (DSD), 10.3390/electronics11071049.
Aug. 2017, pp. 237–243, doi: 10.1109/DSD.2017.79. [142] J. Delvaux and I. Verbauwhede, ‘‘Fault injection modeling attacks on
[124] F. Ganji, J. Krämer, J.-P. Seifert, and S. Tajik, ‘‘Lattice basis reduction 65 nm arbiter and RO sum PUFs via environmental changes,’’ IEEE
attack against physically unclonable functions,’’ in Proc. 22nd ACM Trans. Circuits Syst. I, Reg. Papers, vol. 61, no. 6, pp. 1701–1713,
SIGSAC Conf. Comput. Commun. Secur., Oct. 2015, pp. 1070–1080, doi: Jun. 2014, doi: 10.1109/TCSI.2013.2290845.
10.1145/2810103.2813723.
[125] S. Tajik, F. Ganji, J. P. Seifert, H. Lohrke, and C. Boit, ‘‘Laser fault attack
on physically unclonable functions,’’ in Proc. Workshop Fault Diagnosis
Tolerance Cryptogr., 2016, pp. 85–96, doi: 10.1109/FDTC.2015.19.
[126] S. Tajik, E. Dietz, S. Frohmann, J.-P. Seifert, D. Nedospasov, S. HEMAVATHY (Graduate Student Member,
C. Helfmeier, C. Boit, and H. Dittrich, ‘‘Physical characterization of IEEE) received the master’s degree in VLSI
arbiter PUFs,’’ in Proc. Int. Workshop Cryptograph. Hardw. Embed- design. She is currently pursuing the Ph.D. degree
ded Syst., in Lecture Notes in Computer Science, vol. 8731, 2014, with VIT University, Chennai, with a focus on
pp. 493–509, doi: 10.1007/978-3-662-44709-3_27.
hardware security using physical unclonable func-
[127] Z. Wu, H. Patel, M. Sachdev, and M. V. Tripunitara, ‘‘Strengthening
tions. She has been in the teaching field for ten
PUFs using composition,’’ in Proc. IEEE/ACM Int. Conf.
Comput.-Aided Design (ICCAD), Nov. 2019, pp. 1–6, doi: years. She is a Research Associate with the School
10.1109/ICCAD45719.2019.8942176. of Electronics Engineering, VIT University. She
[128] P. H. Nguyen and D. P. Sahoo, ‘‘An efficient and scalable modeling attack has published in IEEE Consumer Electronics Mag-
on lightweight secure physically unclonable function,’’ IACR Cryptol. azine, two international conferences, and a book
ePrint Arch., vol. 2016, p. 428, Jan. 2016. chapter concentrating on low-power PUF design. Her research interests
[129] U. Rührmair, J. Sölter, F. Sehnke, X. Xu, A. Mahmoud, V. Stoyanova, include low-power VLSI design, adiabatic logic, hardware security in SoC
G. Dror, J. Schmidhuber, W. Burleson, and S. Devadas, ‘‘PUF and FPGA, and physically unclonable functions.
modeling attacks on simulated and silicon data,’’ IEEE Trans. Inf.
Forensics Security, vol. 8, no. 11, pp. 1876–1891, Aug. 2013, doi:
10.1109/TIFS.2013.2279798.
[130] N. Wisiol and M. Margraf, ‘‘Why attackers lose: Design and security
analysis of arbitrarily large XOR arbiter PUFs,’’ J. Cryptograph. Eng.,
V. S. KANCHANA BHAASKARAN (Senior
vol. 9, no. 3, pp. 221–230, Sep. 2019, doi: 10.1007/s13389-019-00204-8.
[131] A. O. Aseeri, Y. Zhuang, and M. S. Alkatheiri, ‘‘A machine learning- Member, IEEE) received the bachelor’s degree
based security vulnerability study on XOR PUFs for resource-constraint in engineering from IE(I), the master’s degree
Internet of Things,’’ in Proc. IEEE Int. Congr. Internet Things (ICIOT), from BITS, and the Ph.D. degree from the Vel-
Jul. 2018, pp. 49–56, doi: 10.1109/ICIOT.2018.00014. lore Institute of Technology (VIT). With nearly
[132] A. O. Aseeri, Y. Zhuang, and M. S. Alkatheiri, ‘‘A subspace pre- 40 years of experience, she has industry, teaching,
learning approach to fast high-accuracy machine learning of large XOR and research experiences. After 11 years of teach-
PUFs with component-differential challenges,’’ in Proc. IEEE Int. Conf. ing at the SSN College of Engineering, she joined
Big Data (Big Data), Dec. 2018, pp. 1563–1568, doi: 10.1109/BIG- VIT Chennai and had been donning the role of
DATA.2018.8621890. the Pro Vice-Chancellor. She has published around
[133] A. Aseeri, ‘‘Noise-resilient neural network-based adversarial attack mod- 140 papers in international journals and reputed conferences and has three
eling for XOR physical unclonable functions,’’ J. Cyber Secur. Mobility, patents published in her field of research. She writes on higher education and
vol. 9, pp. 331–354, Mar. 2020, doi: 10.13052/JCSM2245-1439.926. the impact of ICT in learning, and delivers invited lectures. She is the author
[134] K. T. Mursi, B. Thapaliya, Y. Zhuang, A. O. Aseeri, and M. S. Alkatheiri,
of four books on linear integrated circuits and related subjects published by
‘‘A fast deep learning method for security vulnerability study of XOR
McGraw Hill Education and has contributed book chapters on low-power
PUFs,’’ Electronics, vol. 9, no. 10, pp. 1–13, 2020, doi: 10.3390/electron-
ics9101715.
VLSI circuit design. Her research interests include VLSI design for low-
[135] N. Wisiol, K. T. Mursi, J. P. Seifert, and Y. Zhuang, ‘‘Neural-network- power, microprocessor architectures, and linear integrated circuits. She is a
based modeling attacks on XOR arbiter PUFs revisited,’’ IACR Cryptol. fellow of the Institution of Electronics and Telecommunication Engineers
ePrint Arch., vol. 2021, p. 555, Sep. 2021. (IETE) and the Institution of Engineers (India) (IEI). She is a member of
[136] W. Yu and Y. Wen, ‘‘Efficient hybrid side-channel/machine learning the IET and a Life Member of the ISTE. She is a reviewer of international
attack on XOR PUFs,’’ Electron. Lett., vol. 55, no. 20, pp. 1080–1082, journals and conferences.
Oct. 2019, doi: 10.1049/el.2019.1363.