Institute of Electrical & Electronic Engineers
The authors discuss numerical modeling attacks on several proposed strong Physical Unclonable Functions (PUFs). Given a set of Challenge-Response Pairs (CRPs) of a strong PUF, the goal of their attacks is to construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs. If successful, this algorithm can subsequently impersonate the strong PUF, and can be cloned and distributed arbitrarily. It breaks the security of any applications that rest on the strong PUF's unpredictability and physical unclonability.