Attacking RO-PUFs with Enhanced Challenge-Response Pairs - Archive ouverte HAL Access content directly
Conference Papers Year : 2018

Attacking RO-PUFs with Enhanced Challenge-Response Pairs

(1) , (1)
Nils Wisiol
  • Function : Author
  • PersonId : 1042908
Marian Margraf
  • Function : Author
  • PersonId : 1042909


This paper studies the security of Ring Oscillator Physically Unclonable Function (PUF) with Enhanced Challenge-Response Pairs as proposed by Delavar et al. We present an attack that can predict all PUF responses after querying the PUF with $$n+2$$n+2 attacker-chosen queries. This result renders the proposed RO-PUF with Enhanced Challenge-Response Pairs inapt for most typical PUF use cases, including but not limited to all cases where an attacker has query access.
Fichier principal
Vignette du fichier
472722_1_En_9_Chapter.pdf (241.68 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-02023734 , version 1 (21-02-2019)


Attribution - CC BY 4.0



Nils Wisiol, Marian Margraf. Attacking RO-PUFs with Enhanced Challenge-Response Pairs. 33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.122-126, ⟨10.1007/978-3-319-99828-2_9⟩. ⟨hal-02023734⟩
36 View
14 Download



Gmail Facebook Twitter LinkedIn More