SimLL: Similarity-Based Logic Locking Against Machine Learning Attacks

被引:4
作者
Chowdhury, Subhajit Dutta [1 ]
Yang, Kaixin [1 ]
Nuzzo, Pierluigi [1 ]
机构
[1] Univ Southern Calif, Ming Hsieh Dept Elect & Comp Engn, Los Angeles, CA 90007 USA
来源
2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC | 2023年
关键词
Topological similarity; graph neural networks; machine learning; link prediction; hardware security;
D O I
10.1109/DAC56929.2023.10247822
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Logic locking is a promising technique for protecting integrated circuit designs while outsourcing their fabrication. Recently, graph neural network (GNN)-based link prediction attacks have been developed which can successfully break all the multiplexer-based locking techniques that were expected to be learning-resilient. We present SimLL, a novel similarity-based locking technique which locks a design using multiplexers and shows robustness against the existing structure-exploiting oracle-less learning-based attacks. Aiming to confuse the machine learning (ML) models, SimLL introduces key-controlled multiplexers between logic gates or wires that exhibit high levels of topological and functional similarity. Empirical results show that SimLL can degrade the accuracy of existing ML-based attacks to approximately 50%, resulting in a negligible advantage over random guessing.
引用
收藏
页数:6
相关论文
共 16 条
[1]   SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking [J].
Alaql, Abdulrahman ;
Rahman, Md Moshiur ;
Bhunia, Swarup .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (08) :1529-1542
[2]  
Alaql A, 2019, PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST)
[3]  
Alrahis L, 2022, DES AUT TEST EUROPE, P694, DOI 10.23919/DATE54114.2022.9774603
[4]   OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking [J].
Alrahis, Lilas ;
Patnaik, Satwik ;
Shafique, Muhammad ;
Sinanoglu, Ozgur .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) :1602-1606
[5]  
Chakraborty P, 2018, PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), P56, DOI 10.1109/AsianHOST.2018.8607163
[6]   ReIGNN: State Register Identification Using Graph Neural Networks for Circuit Reverse Engineering [J].
Chowdhury, Subhajit Dutta ;
Yang, Kaixin ;
Nuzzo, Pierluigi .
2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD), 2021,
[7]   Enhancing SAT-Attack Resiliency and Cost-Effectiveness of Reconfigurable-Logic-Based Circuit Obfuscation [J].
Chowdhury, Subhajit Dutta ;
Zhang, Gengyu ;
Hu, Yinghua ;
Nuzzo, Pierluigi .
2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
[8]   RELIC-FUN: Logic Identification through Functional Signal Comparisons [J].
Geist, James ;
Meade, Travis ;
Zhang, Shaojie ;
Jin, Yier .
PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
[9]   Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking [J].
Plaza, Stephen M. ;
Markov, Igor L. .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (06) :961-971
[10]   A Primer on Hardware Security: Models, Methods, and Metrics [J].
Rostami, Masoud ;
Koushanfar, Farinaz ;
Karri, Ramesh .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1283-1295