Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

CMAES attack based on hardware CRP #1

Open
GaoxiangLi opened this issue Nov 28, 2022 · 1 comment
Open

CMAES attack based on hardware CRP #1

GaoxiangLi opened this issue Nov 28, 2022 · 1 comment

Comments

@GaoxiangLi
Copy link

Hello! I read the code for Becker's CMAES attack on XOR-PUF, and found that the attack is based on simulated PUF. Is there any code to apply this attack on the CRPs generated from hardware?

Really appreciate!

@ChengluJin
Copy link
Contributor

@GaoxiangLi Thanks for your question! To apply the attack on hardware-generated data, you just need to skip the PUF simulation part and directly apply the hardware-generated CRPs to the attack/modeling/optimization function. The input of the attack/modeling/optimization program is Challenge-Response Pairs/Challenge-Reliability Pairs; it does not care how you generate the training dataset.

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants