Paper 2019/566

Deep Learning based Model Building Attacks on Arbiter PUF Compositions

Pranesh Santikellur, Aritra Bhattacharyay, and Rajat Subhra Chakraborty


Robustness to modeling attacks is an important requirement for PUF circuits. Several reported Arbiter PUF com- positions have resisted modeling attacks. and often require huge computational resources for successful modeling. In this paper we present deep feedforward neural network based modeling attack on 64-bit and 128-bit Arbiter PUF (APUF), and several other PUFs composed of Arbiter PUFs, namely, XOR APUF, Lightweight Secure PUF (LSPUF), Multiplexer PUF (MPUF) and its variants (cMPUF and rMPUF), and the recently proposed Interpose PUF (IPUF, up to the (4,4)-IPUF configuration). The technique requires no auxiliary information (e.g. side-channel information or reliability information), while employing deep neural networks of relatively low structural complexity to achieve very high modeling accuracy at low computational overhead (compared to previously proposed approaches), and is reasonably robust to error-inflicted training dataset.

Available format(s)
Publication info
Preprint. MINOR revision.
physically unclonable functionmachine learningdeep learningarbiter pufPUF
Contact author(s)
pranesh sklr @ iitkgp ac in
rschakraborty @ cse iitkgp ac in
2019-09-23: revised
2019-05-27: received
See all versions
Short URL
Creative Commons Attribution


      author = {Pranesh Santikellur and Aritra  Bhattacharyay and Rajat Subhra Chakraborty},
      title = {Deep Learning based Model Building Attacks on Arbiter PUF Compositions},
      howpublished = {Cryptology ePrint Archive, Paper 2019/566},
      year = {2019},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.