A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks.
Gaoxiang LiKhalid T. MursiAhmad O. AseeriMohammed Saeed AlkatheiriYu ZhuangPublished in: CoRR (2022)
Keyphrases
- machine learning
- security threats
- security mechanisms
- security problems
- computer security
- information security
- machine learning algorithms
- security measures
- countermeasures
- java card
- cryptographic protocols
- security protocols
- machine learning methods
- cyber attacks
- malicious users
- security vulnerabilities
- security risks
- attack scenarios
- security requirements
- security issues
- security policies
- denial of service attacks
- stream cipher
- information leakage
- learning algorithm
- ddos attacks
- biometric template
- fault injection
- decision trees
- intrusion detection
- malicious attacks
- smart card
- computer networks
- network security
- biometric systems