Skip to content

Defense/Attack PUF Library (DA PUF Library)

License

Notifications You must be signed in to change notification settings

kamat900/DA_PUF_Library

 
 

Repository files navigation

DA_PUF_Library

Defense/Attack PUF Library (DA PUF Library)

Authors: Durga Prasad Sahoo, Phuong Ha Nguyen, Chenglu Jin and Kaleel Mahmood

DA PUF Library contains the following source codes:

  1. MATLAB codes for simulating and attacking Arbiter PUFs, XOR Arbiter PUFs and Interpose PUFs. The availabe attacking methods include Logistic Regression, reliability based CMA-ES attack and CMA-ES attack based on challenge response pairs. Also, k junta tests on Arbiter PUF, XOR Arbiter PUF, and Interpose PUF are available.
  2. C# codes for simulating and attacking Arbiter PUFs and XOR Arbiter PUFs. Notice that, this C# code supports parallel computing.
  3. Python codes for running deep neural network attack on XOR Arbiter PUFs.
  4. FPGA implmenetation of Arbiter PUFs, XOR Arbiter PUFs and Interpose PUFs.

If you need to reference to this library, please cite paper "The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks", published at CHES 2019, authored by Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Ruhrmair, and Marten van Dijk.

If you have any questions regarding the codes, please direct your questions as following:

  1. Regarding MATLAB codes, please send emails to Durga at dpsahoo.cs@gmail.com, or Ha at phuong_ha.nguyen@uconn.edu
  2. Regarding C# codes and Python codes, please send emails to Kaleel at kaleel.mahmood@uconn.edu
  3. Regarding hardware implementation, please send emails to Durga at dpsahoo.cs@gmail.com, or Chenglu at chenglu.jin@uconn.edu

About

Defense/Attack PUF Library (DA PUF Library)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Verilog 44.6%
  • VHDL 27.0%
  • MATLAB 11.5%
  • HTML 11.5%
  • C# 5.1%
  • Python 0.1%
  • Other 0.2%