Security Evaluation of RG-DTM PUF Using Machine Learning Attacks.
Mitsuru ShiozakiKousuke OgawaKota FuruhashiTakahiko MurayamaMasaya YoshikawaTakeshi FujinoPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2014)
Keyphrases
- machine learning
- security threats
- security mechanisms
- malicious attacks
- security protocols
- security problems
- denial of service attacks
- machine learning methods
- computer security
- cyber attacks
- information security
- security vulnerabilities
- security issues
- malicious users
- security breaches
- cryptographic protocols
- security measures
- learning algorithm
- stream cipher
- chosen plaintext
- access control
- security risks
- countermeasures
- insider attacks
- data mining
- electronic devices
- java card
- security requirements
- watermarking scheme
- intrusion detection
- fault injection
- biometric template