| Citation: | Xuejiao MA, Gang LI. ANN Feature Vector Extraction Based Attack Method for Flip-Flop Based Arbiter Physical Unclonable Function[J]. Journal of Electronics & Information Technology, 2021, 43(9): 2498-2507. doi: 10.11999/JEIT210614 | 
 
	                | [1] | LI Gang, WANG Pengjun, MA Xuejiao, et al. A multimode configurable physically unclonable function with bit-instability-screening and power-gating strategies[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2021, 29(1): 100–111. doi:  10.1109/TVLSI.2020.3030945 | 
| [2] | YAN Wei, TEHRANIPOOR F, and CHANDY J A. PUF-based fuzzy authentication without error correcting codes[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2017, 36(9): 1445–1457. doi:  10.1109/TCAD.2016.2638445 | 
| [3] | USMANI M A, KESHAVARZ S, MATTHEWS E, et al. Efficient PUF-based key generation in FPGAs using per-device configuration[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019, 27(2): 364–375. doi:  10.1109/TVLSI.2018.2877438 | 
| [4] | 汪鹏君, 李乐薇, 郑雁公, 等. 基于气敏传感器的高稳态物理不可克隆函数发生器[J]. 电子与信息学报, 2021, 43(6): 1596–1602. doi:  10.11999/JEIT201104 WANG Pengjun, LI Lewei, ZHENG Yangong, et al. High steady-state physical unclonable function generator based on gas sensors[J]. Journal of Electronics &Information Technology, 2021, 43(6): 1596–1602. doi:  10.11999/JEIT201104 | 
| [5] | 徐金甫, 吴缙, 李军伟, 等. 基于敏感度混淆机制的控制型物理不可克隆函数研究[J]. 电子与信息学报, 2019, 41(7): 1601–1609. doi:  10.11999/JEIT180775 XU Jinfu, WU Jin, LI Junwei, et al. Controlled physical unclonable function research based on sensitivity confusion mechanism[J]. Journal of Electronics &Information Technology, 2019, 41(7): 1601–1609. doi:  10.11999/JEIT180775 | 
| [6] | LIM D. Extracting secret keys from integrated circuits[D]. [Ph. D. dissertation], Massachusetts Institute of Technology, 2004. | 
| [7] | RÜHRMAIR U, SÖLTER J, SEHNKE F, et al. PUF modeling attacks on simulated and silicon data[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(11): 1876–1891. doi:  10.1109/TIFS.2013.2279798 | 
| [8] | SUH G E and DEVADAS S. Physical unclonable functions for device authentication and secret key generation[C]. The 44th ACM/IEEE Design Automation Conference, San Diego, USA, 2007: 9–14. doi: 10.1145/1278480.1278484. | 
| [9] | MAITI A and SCHAUMONT P. Improving the quality of a physical unclonable function using configurable ring oscillators[C]. 2009 International Conference on Field Programmable Logic and Applications, Prague, Czech Republic, 2009: 703–707. doi: 10.1109/FPL.2009.5272361. | 
| [10] | SAHOO D P, NGUYEN P H, MUKHOPADHYAY D, et al. A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(8): 1334–1343. doi:  10.1109/TCAD.2015.2448677 | 
| [11] | NGUYEN P H, SAHOO D P, JIN Chenglu, et al. The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019(4): 243–290. doi:  10.13154/tches.v2019.i4.243-290 | 
| [12] | SAHOO D P, MUKHOPADHYAY D, CHAKRABORTY R S, et al. A multiplexer-based arbiter PUF composition with enhanced reliability and security[J]. IEEE Transactions on Computers, 2018, 67(3): 403–417. doi:  10.1109/TC.2017.2749226 | 
| [13] | GU Chongyan, LIU Weiqiang, CUI Yijun, et al. A Flip-Flop based Arbiter Physical Unclonable Function (APUF) design with high entropy and uniqueness for FPGA implementation[J]. IEEE Transactions on Emerging Topics in Computing, To be published. doi: 10.1109/TETC.2019.2935465. | 
| [14] | AWANO H, IIZUKA T, and IKEDA M. PUFNet: A deep neural network based modeling attack for physically unclonable function[C]. 2019 IEEE International Symposium on Circuits and Systems, Sapporo, Japan, 2019: 1–4. doi: 10.1109/ISCAS.2019.8702431. | 
| [15] | SANTIKELLUR P and CHAKRABORTY R S. A computationally efficient tensor regression network-based modeling attack on XOR arbiter PUF and its variants[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, 40(6): 1197–1206. doi:  10.1109/TCAD.2020.3032624 | 
| [16] | SHI Junye, LU Yang, and ZHANG Jiliang. Approximation attacks on strong PUFs[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 39(10): 2138–2151. doi:  10.1109/TCAD.2019.2962115 | 
| [17] | CHATTERJEE D, MUKHOPADHYAY D, and HAZRA A. Interpose PUF can be PAC learned[OL]. https://www.researchgate.net/publication/343524875_Interpose_PUF_can_be_PAC_Learned?channel=doi&linkId=5f2e86d5458515b7290d567f&showFulltext=true. 2020. | 
| [18] | CHAKRABORTY R S, JELDI R R, SAHA I, et al. Binary decision diagram assisted modeling of FPGA-based physically unclonable function by genetic programming[J]. IEEE Transactions on Computers, 2017, 66(6): 971–981. doi:  10.1109/TC.2016.2603498 | 
