£74.81

Springer On the Learnability of Physically Unclonable Functions (T-Labs Series in Telecommunication Services)

Price data last checked 56 day(s) ago - refreshing...

View at Amazon

Price History & Forecast

Last 35 days • 35 data points (No recent data available)

Historical
Generating forecast...
£74.81 £74.04 £74.21 £74.38 £74.54 £74.71 £74.88 25 January 2026 02 February 2026 11 February 2026 19 February 2026 28 February 2026

Price Distribution

Price distribution over 35 days • 2 price levels

Days at Price
Current Price
12 days 23 days · current 0 6 12 17 23 £74 £75 Days at Price

Price Analysis

Most common price: £75 (23 days, 65.7%)

Price range: £74 - £75

Price levels: 2 different prices over 35 days

Description

Product Description This book addresses the issue of Machine Learning (ML) attacks on Integrated Circuits through Physical Unclonable Functions (PUFs). It provides the mathematical proofs of the vulnerability of various PUF families, including Arbiter, XOR Arbiter, ring-oscillator, and bistable ring PUFs, to ML attacks. To achieve this goal, it develops a generic framework for the assessment of these PUFs based on two main approaches. First, with regard to the inherent physical characteristics, it establishes fit-for-purpose mathematical representations of the PUFs mentioned above, which adequately reflect the physical behavior of these primitives. To this end, notions and formalizations that are already familiar to the ML theory world are reintroduced in order to give a better understanding of why, how, and to what extent ML attacks against PUFs can be feasible in practice. Second, the book explores polynomial time ML algorithms, which can learn the PUFs under the appropriate representation. More importantly, in contrast to previous ML approaches, the framework presented here ensures not only the accuracy of the model mimicking the behavior of the PUF, but also the delivery of such a model.   Besides off-the-shelf ML algorithms, the book applies a set of algorithms hailing from the field of property testing, which can help to evaluate the security of PUFs. They serve as a “toolbox”, from which PUF designers and manufacturers can choose the indicators most relevant for their requirements. Last but not least, on the basis of learning theory concepts, the book explicitly states that the PUF families cannot be considered as an ultimate solution to the problem of insecure ICs. As such, it provides essential insights into both academic research on and the design and manufacturing of PUFs. From the Back Cover This book addresses the issue of Machine Learning (ML) attacks on Integrated Circuits through Physical Unclonable Functions (PUFs). It provides the mathematical proofs of the vulnerability of various PUF families, including Arbiter, XOR Arbiter, ring-oscillator, and bistable ring PUFs, to ML attacks. To achieve this goal, it develops a generic framework for the assessment of these PUFs based on two main approaches. First, with regard to the inherent physical characteristics, it establishes fit-for-purpose mathematical representations of the PUFs mentioned above, which adequately reflect the physical behavior of these primitives. To this end, notions and formalizations that are already familiar to the ML theory world are reintroduced in order to give a better understanding of why, how, and to what extent ML attacks against PUFs can be feasible in practice. Second, the book explores polynomial time ML algorithms, which can learn the PUFs under the appropriate representation. More importantly, in contrast to previous ML approaches, the framework presented here ensures not only the accuracy of the model mimicking the behavior of the PUF, but also the delivery of such a model.  Besides off-the-shelf ML algorithms, the book applies a set of algorithms hailing from the field of property testing, which can help to evaluate the security of PUFs. They serve as a “toolbox”, from which PUF designers and manufacturers can choose the indicators most relevant for their requirements. Last but not least, on the basis of learning theory concepts, the book explicitly states that the PUF families cannot be considered as an ultimate solution to the problem of insecure ICs. As such, it provides essential insights into both academic research on and the design and manufacturing of PUFs.

Product Specifications

Format
Hardcover
Domain
Amazon UK
Release Date
05 April 2018
Listed Since
30 January 2018

Barcode

No barcode data available

Similar Products You Might Like

On the Physical Security of Physically Unclonable Functions (T-Labs Series in Telecommunication Services)
95% match

On the Physical Security of Physically Unclonable Functions (T-Labs Series in Telecommunication Services)

Springer

£58.71 06 Jan 2026
Machine Learning for Embedded System Security
93% match

Machine Learning for Embedded System Security

£73.85 11 Jan 2026
Adversary-Aware Learning Techniques and Trends in Cybersecurity
93% match

Adversary-Aware Learning Techniques and Trends in Cybersecurity

Springer

£99.37 21 Feb 2026
Privacy, Security And Forensics in The Internet of Things (IoT)
93% match

Privacy, Security And Forensics in The Internet of Things (IoT)

Springer

£126.02 12 Dec 2025
Data Science in Cybersecurity and Cyberthreat Intelligence: 177 (Intelligent Systems Reference Library, 177)
93% match

Data Science in Cybersecurity and Cyberthreat Intelligence: 177 (Intelligent Systems Reference Library, 177)

Springer

£126.00 04 Mar 2026
Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence
93% match

Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence

£139.99 13 Jan 2026
Privacy, Security And Forensics in The Internet of Things (IoT)
93% match

Privacy, Security And Forensics in The Internet of Things (IoT)

Springer

£105.00 31 Jan 2026
Internet of Things, Smart Computing and Technology: A Roadmap Ahead: 266 (Studies in Systems, Decision and Control, 266)
93% match

Internet of Things, Smart Computing and Technology: A Roadmap Ahead: 266 (Studies in Systems, Decision and Control, 266)

£119.18 08 Jan 2026
Counterfeit Integrated Circuits: Detection and Avoidance
93% match

Counterfeit Integrated Circuits: Detection and Avoidance

Springer

£99.94 26 Feb 2026
Classification Functions for Machine Learning and Data Mining (Synthesis Lectures on Digital Circuits & Systems)
93% match

Classification Functions for Machine Learning and Data Mining (Synthesis Lectures on Digital Circuits & Systems)

Springer

£45.68 22 Feb 2026
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
93% match

Evolution of Smart Sensing Ecosystems with Tamper Evident Security

Springer

£102.09 23 Feb 2026
Counterfeit Integrated Circuits: Detection and Avoidance
93% match

Counterfeit Integrated Circuits: Detection and Avoidance

Springer

£64.94 06 Mar 2026
Springer Systematic Modeling of Telecom Frontends - 842
93% match

Springer Systematic Modeling of Telecom Frontends - 842

Springer

£113.63 18 Apr 2026
Design Automation for Differential MOS Current-Mode Logic Circuits
93% match

Design Automation for Differential MOS Current-Mode Logic Circuits

Springer

£99.42 09 Jan 2026
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies
93% match

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies

Chapman and Hall/CRC

£79.44 26 Feb 2026
Springer Cyberspace Mimic Defense - Wireless Network Security
93% match

Springer Cyberspace Mimic Defense - Wireless Network Security

Springer

£136.00 18 Apr 2026
Adaptive Digital Circuits for Power-Performance Range beyond Wide Voltage Scaling: From the Clock Path to the Data Path
93% match

Adaptive Digital Circuits for Power-Performance Range beyond Wide Voltage Scaling: From the Clock Path to the Data Path

Springer

£61.10 14 Feb 2026
Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence: 86 (Advances in Information Security, 86)
93% match

Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence: 86 (Advances in Information Security, 86)

Springer

£91.79 09 Mar 2026
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
93% match

Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment

Springer

£87.47 23 Feb 2026
Springer Machine Learning for Critical Internet of Medical Things
93% match

Springer Machine Learning for Critical Internet of Medical Things

Springer

£107.34 16 Apr 2026
Design Automation for Field-coupled Nanotechnologies
93% match

Design Automation for Field-coupled Nanotechnologies

Springer

£77.17 07 Mar 2026
Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1: 308 (Advances in Intelligent Systems and Computing, 308)
93% match

Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1: 308 (Advances in Intelligent Systems and Computing, 308)

Springer

£149.67 25 Jan 2026
Malware Analysis Using Artificial Intelligence and Deep Learning
93% match

Malware Analysis Using Artificial Intelligence and Deep Learning

Springer

£97.00 10 Feb 2026
Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis
93% match

Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis

Springer

£57.91 03 Mar 2026