Return to Article Details Splitting the Interpose PUF: A Novel Modeling Attack Strategy Download Download PDF