Defense/Attack PUF Library (DA PUF Library)
Authors: Durga Prasad Sahoo, Phuong Ha Nguyen, Chenglu Jin and Kaleel Mahmood
DA PUF Library contains the following source codes:
- MATLAB codes for simulating and attacking Arbiter PUFs, XOR Arbiter PUFs and Interpose PUFs. The availabe attacking methods include Logistic Regression, reliability based CMA-ES attack and CMA-ES attack based on challenge response pairs. Also, k junta tests on Arbiter PUF, XOR Arbiter PUF, and Interpose PUF are available.
- C# codes for simulating and attacking Arbiter PUFs and XOR Arbiter PUFs. Notice that, this C# code supports parallel computing.
- Python codes for running deep neural network attack on XOR Arbiter PUFs.
- FPGA implmenetation of Arbiter PUFs, XOR Arbiter PUFs and Interpose PUFs.
If you need to reference to this library, please cite paper "The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks", published at CHES 2019, authored by Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Ruhrmair, and Marten van Dijk.
If you have any questions regarding the codes, please direct your questions as following:
- Regarding MATLAB codes, please send emails to Durga at email@example.com, or Ha at firstname.lastname@example.org
- Regarding C# codes and Python codes, please send emails to Kaleel at email@example.com
- Regarding hardware implementation, please send emails to Durga at firstname.lastname@example.org, or Chenglu at email@example.com