You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello! I read the code for Becker's CMAES attack on XOR-PUF, and found that the attack is based on simulated PUF. Is there any code to apply this attack on the CRPs generated from hardware?
Really appreciate!
The text was updated successfully, but these errors were encountered:
@GaoxiangLi Thanks for your question! To apply the attack on hardware-generated data, you just need to skip the PUF simulation part and directly apply the hardware-generated CRPs to the attack/modeling/optimization function. The input of the attack/modeling/optimization program is Challenge-Response Pairs/Challenge-Reliability Pairs; it does not care how you generate the training dataset.
Hello! I read the code for Becker's CMAES attack on XOR-PUF, and found that the attack is based on simulated PUF. Is there any code to apply this attack on the CRPs generated from hardware?
Really appreciate!
The text was updated successfully, but these errors were encountered: