DK Lock: Dual Key Logic Locking Against Oracle-Guided Attacks

被引:8
作者
Maynard, Jordan [1 ]
Rezaei, Amin [1 ]
机构
[1] Calif State Univ Long Beach, Comp Engn & Comp Sci Dept, Long Beach, CA 90840 USA
来源
2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED | 2023年
基金
美国国家科学基金会;
关键词
Logic Locking; Logic Encryption; SAT Attack; Logic Obfuscation; Sequential Circuits; Dynamic Key; OBFUSCATION;
D O I
10.1109/ISQED57927.2023.10129368
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The semiconductor industry must deal with different hardware threats like piracy and overproduction as a result of outsourcing manufacturing. While there are many proposals to lock the circuit using a global protected key only known to the designer, there exist numerous oracle-guided attacks that can examine the locked netlist with the assistance of an activated IC and extract the correct key. In this paper, by adopting a low-overhead structural method, we propose DK Lock, a novel Dual Key locking method that securely protects sequential circuits with two different keys that are applied to one set of key inputs at different times. DK Lock structurally adds an activation phase to the sequential circuit, and a correct key must be applied for several cycles to exit this phase. Once the circuit has been successfully activated, a new functional key must be applied to the same set of inputs to resume normal operation. DK Lock opens up new avenues for hardware IP protection by simultaneously refuting the single static key assumption of the existing attacks and overcoming the state explosion problem of state-of-the-art sequential logic locking methods. Our experiments confirm that DK Lock maintains a high degree of security with reasonable power and area overheads.
引用
收藏
页码:252 / 258
页数:7
相关论文
共 55 条
[21]   HLock: Locking IPs at the High-Level Language [J].
Muttaki, Md Rafid ;
Mohammadivojdan, Roshanak ;
Tehranipoor, Mark ;
Farahmandi, Farimah .
2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2021, :79-84
[22]  
Rajendran J, 2012, DES AUT CON, P83
[23]   Evaluating the Security of eFPGA-based Redaction Algorithms [J].
Rezaei, Amin ;
Afsharmazayejani, Raheel ;
Maynard, Jordan .
2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2022,
[24]   Global Attack and Remedy on IC-Specific Logic Encryption [J].
Rezaei, Amin ;
Hedayatipour, Ava ;
Sayadi, Hossein ;
Aliasgari, Mehrdad ;
Zhou, Hai .
2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, :145-148
[25]   Sequential Logic Encryption Against Model Checking Attack [J].
Rezaei, Amin ;
Zhou, Hai .
PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, :1178-1181
[26]  
Rezaei A, 2020, DES AUT TEST EUROPE, P13, DOI 10.23919/DATE48585.2020.9116500
[27]   Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries [J].
Rezaei, Amin ;
Gu, Jie ;
Zhou, Hai .
2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, :537-542
[28]   CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States [J].
Rezaei, Amin ;
Li, You ;
Shen, Yuanqi ;
Kong, Shuyu ;
Zhou, Hai .
24TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2019), 2019, :358-363
[29]  
Rezaei A, 2018, DES AUT TEST EUROPE, P85, DOI 10.23919/DATE.2018.8341984
[30]  
Roshanisefat Shervin., 2021, GREAT LAK S VLSI GLS, V2021, P221, DOI DOI 10.1145/3453688.3461760