PUF modeling attacks: An introduction and overview | IEEE Conference Publication | IEEE Xplore