The Modeling Attack and Security Enhancement of the XbarPUF with Both Column Swapping and XORing.
Yongliang ChenXiaole CuiWenqiang YeXiaoxin CuiPublished in: ACM Great Lakes Symposium on VLSI (2021)
Keyphrases
- cyber attacks
- information security
- fault injection
- security measures
- security vulnerabilities
- countermeasures
- security requirements
- security policies
- network security
- buffer overflow
- statistical databases
- security issues
- security mechanisms
- authentication mechanism
- malicious users
- denial of service attacks
- encryption algorithm
- key agreement
- forensic analysis
- security problems
- rows and columns
- information systems
- image enhancement
- intrusion detection