SimLL: Similarity-Based Logic Locking Against Machine Learning Attacks

被引:1
|
作者
Chowdhury, Subhajit Dutta [1 ]
Yang, Kaixin [1 ]
Nuzzo, Pierluigi [1 ]
机构
[1] Univ Southern Calif, Ming Hsieh Dept Elect & Comp Engn, Los Angeles, CA 90007 USA
来源
2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC | 2023年
关键词
Topological similarity; graph neural networks; machine learning; link prediction; hardware security;
D O I
10.1109/DAC56929.2023.10247822
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Logic locking is a promising technique for protecting integrated circuit designs while outsourcing their fabrication. Recently, graph neural network (GNN)-based link prediction attacks have been developed which can successfully break all the multiplexer-based locking techniques that were expected to be learning-resilient. We present SimLL, a novel similarity-based locking technique which locks a design using multiplexers and shows robustness against the existing structure-exploiting oracle-less learning-based attacks. Aiming to confuse the machine learning (ML) models, SimLL introduces key-controlled multiplexers between logic gates or wires that exhibit high levels of topological and functional similarity. Empirical results show that SimLL can degrade the accuracy of existing ML-based attacks to approximately 50%, resulting in a negligible advantage over random guessing.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A dynamically configurable LFSR-based PUF design against machine learning attacks
    Hou, Shen
    Deng, Ding
    Wang, Zhenyu
    Shi, Jiahe
    Li, Shaoqing
    Guo, Yang
    CCF TRANSACTIONS ON HIGH PERFORMANCE COMPUTING, 2021, 3 (01) : 31 - 56
  • [32] SeeMLess: Security Evaluation of Logic Locking using Machine Learning oriented Estimation
    Ahmed, Bulbul
    Rahman, Sazadur
    Azar, Kimia Zamiri
    Farahmandi, Farimah
    Rahman, Fahim
    Tehranipoor, Mark
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 489 - 494
  • [33] A dynamically configurable LFSR-based PUF design against machine learning attacks
    Shen Hou
    Ding Deng
    Zhenyu Wang
    Jiahe Shi
    Shaoqing Li
    Yang Guo
    CCF Transactions on High Performance Computing, 2021, 3 : 31 - 56
  • [34] Machine Learning Based Runtime Detection and Recovery Method Against UAV Sensor Attacks
    Sun C.
    Zeng H.
    Song H.
    Wang Y.
    Zhang Z.
    Ma J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2291 - 2303
  • [35] An Innovative Delay based Algorithm to Boost PUF Security Against Machine Learning Attacks
    Amsaad, Fathi
    Choudhury, Muhtadi
    Chaudhuri, Chayanika Roy
    Niamat, Mohammed
    2016 ANNUAL CONNECTICUT CONFERENCE ON INDUSTRIAL ELECTRONICS, TECHNOLOGY AND AUTOMATION (CT-IETA), 2016,
  • [36] Logic-based machine learning
    Muggleton, S
    Marginean, F
    LOGIC-BASED ARTIFICIAL INTELLIGENCE, 2000, 597 : 315 - 330
  • [37] Model Agnostic Defence Against Backdoor Attacks in Machine Learning
    Udeshi, Sakshi
    Peng, Shanshan
    Woo, Gerald
    Loh, Lionell
    Rawshan, Louth
    Chattopadhyay, Sudipta
    IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (02) : 880 - 895
  • [38] CT PUF: Configurable Tristate PUF Against Machine Learning Attacks for IoT Security
    Zhang, Jiliang
    Shen, Chaoqun
    Guo, Zhiyang
    Wu, Qiang
    Chang, Wanli
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14452 - 14462
  • [39] Coin Flipping PUF: A Novel PUF With Improved Resistance Against Machine Learning Attacks
    Tanaka, Yuki
    Bian, Song
    Hiromoto, Masayuki
    Sato, Takashi
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2018, 65 (05) : 602 - 606
  • [40] FriendlyFoe: Adversarial Machine Learning as a Practical Architectural Defense against Side Channel Attacks
    Nam, Hyoungwook
    Pothukuchi, Raghavendra Pradyumna
    Li, Bo
    Kim, Nam Sung
    Torrellas, Josep
    PROCEEDINGS OF THE 2024 THE INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, PACT 2024, 2024, : 338 - 350