共 34 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]
Alkatheiri MS, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P181, DOI 10.1109/DESEC.2017.8073845
[3]
[Anonymous], 2016, P ICLR
[4]
A Formal Foundation for the Security Features of Physical Functions
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:397-412
[5]
Aseeri A, 2020, J CYBER SECUR MOBIL, P331, DOI 10.13052/jcsm2245-1439.926
[6]
A Machine Learning-based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things
[J].
2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT),
2018,
:49-56
[7]
Avvaru SVS, 2017, MIDWEST SYMP CIRCUIT, P934, DOI 10.1109/MWSCAS.2017.8053078
[9]
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:535-555