SKG-Lock+: A Provably Secure Logic Locking SchemeCreating Significant Output Corruption

被引:2
作者
Nguyen, Quang-Linh [1 ,2 ]
Dupuis, Sophie [1 ]
Flottes, Marie-Lise [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] Univ Montpellier, Lab Informat Robot & Microelect Montpellier, CNRS, F-34095 Montpellier 5, France
[2] STMicroelectronics, 12 Rue Jules Horowitz, F-38019 Grenoble, France
关键词
logic locking; SAT attack; Design-for-Trust; hardware security; IP protection; overproduction; SAT ATTACK;
D O I
10.3390/electronics11233906
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current trend to globalize the supply chain in the Integrated Circuits (ICs) industry has raised several security concerns including, among others, IC overproduction. Over the past years, logic locking has grown into a prominent countermeasure to tackle this threat in particular. Logic locking consists of "locking" an IC with an added primary input, the so-called key, which, unless fed with the correct secret value, renders the ICs unusable. One of the first criteria ensuring the quality of a logic locking technique was the output corruption, i.e., the corruption at the outputs of a locked circuit, for any wrong key value. However, since the introduction of SAT-based attacks, resulting countermeasures have compromised this criterion in favor of a better resilience against such attacks. In this work, we propose SKG-Lock+, a Provably Secure Logic Locking scheme that can thwart SAT-based attacks while maintaining significant output corruption. We perform a comprehensive security analysis of SKG-Lock+ and show its resilience against SAT-based attacks, as well as various other state-of-the-art attacks. Compared with related works, SKG-Lock+ provides higher output corruption and incurs acceptable overhead.
引用
收藏
页数:24
相关论文
共 67 条
  • [1] SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking
    Alaql, Abdulrahman
    Rahman, Md Moshiur
    Bhunia, Swarup
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (08) : 1529 - 1542
  • [2] E2LEMI:Energy-Efficient Logic Encryption Using Multiplexer Insertion
    Alasad, Qutaiba
    Bi, Yu
    Yuan, Jiann-Shuin
    [J]. ELECTRONICS, 2017, 6 (01)
  • [3] GNNUnlock plus : A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking
    Alrahis, Lilas
    Patnaik, Satwik
    Hanif, Muhammad Abdullah
    Saleh, Hani
    Shafique, Muhammad
    Sinanoglu, Ozgur
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (03) : 1575 - 1592
  • [4] OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking
    Alrahis, Lilas
    Patnaik, Satwik
    Shafique, Muhammad
    Sinanoglu, Ozgur
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) : 1602 - 1606
  • [5] Azar K.Z., 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst, V2019, P97, DOI DOI 10.46586/TCHES.V2019.I1.97-122
  • [6] NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures
    Azar, Kimia Zamiri
    Kamali, Hadi Mardani
    Homayoun, Houman
    Sasan, Avesta
    [J]. 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
  • [7] Brglez F., 1985, INT S CIRCUITS SYSTE, P663
  • [8] Keynote: A Disquisition on Logic Locking
    Chakraborty, Abhishek
    Jayasankaran, Nithyashankari Gummidipoondi
    Liu, Yuntao
    Rajendran, Jeyavijayan
    Sinanoglu, Ozgur
    Srivastava, Ankur
    Xie, Yang
    Yasin, Muhammad
    Zuzak, Michael
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (10) : 1952 - 1972
  • [9] SAIL: Analyzing Structural Artifacts of Logic Locking Using Machine Learning
    Chakraborty, Prabuddha
    Cruz, Jonathan
    Alaql, Abdulrahman
    Bhunia, Swarup
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3828 - 3842
  • [10] Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    [J]. 2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 96 - 99