On the Physical Security of Physically Unclonable Functions