all InfoSec news
Design Exploration and Security Assessment of PUF-on-PUF Implementations. (arXiv:2206.11840v1 [cs.CR])
June 24, 2022, 1:20 a.m. | Kleber Stangherlin, Zhuanhao Wu, Hiren Patel, Manoj Sachdev
cs.CR updates on arXiv.org arxiv.org
We design, implement, and assess the security of several variations of the
PUF-on-PUF (POP) architecture. We perform extensive experiments with deep
neural networks (DNNs), showing results that endorse its resilience to learning
attacks when using APUFs with 6, or more, stages in the first layer.
Compositions using APUFs with 2, and 4 stages are shown vulnerable to DNN
attacks. We reflect on such results, extending previous techniques of
influential bits to assess stage bias in APUF instances. Our data shows …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Engineering Manager - Cloud Security team
@ SentinelOne | Prague, Czech Republic
Legal & Compliance Apprentice (H/F)
@ Novo Nordisk | Puteaux, Île-de-France, FR
Manager, Governance Risk & Compliance
@ Comcast | Virtual