Large-Scale Logic-Locking Attacks via Simulation

被引:1
|
作者
Purdy, Ruben [1 ]
Blanton, R. D. Shawn [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15232 USA
来源
PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022) | 2022年
关键词
Hardware Security; Logic Locking; Obfuscation;
D O I
10.1109/ISQED54688.2022.9806265
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Because IC security has become an increasingly prevalent issue for hardware designers, a number of IC protection schemes have been introduced in the literature. One such scheme, logic locking, involves transforming a hardware design so that it will not operate correctly unless extra inputs (called key inputs) are driven to specific values that are secret. Many existing logic-locking solutions are vulnerable to attacks that uncover the key-input values necessary for correct operation. However, the success of such attacks wane as the size of the design and the number of key inputs increases. In this work, we introduce a logic-locking attack which uses circuit simulators to determine key-input values from large-scale circuits with thousands of added key inputs. Attacks performed on such designs demonstrate the effectiveness of this approach in comparison to other attacks.
引用
收藏
页码:352 / 357
页数:6
相关论文
共 41 条
  • [1] Special Session: Novel Attacks on Logic-Locking
    Jain, Ayush
    Guin, Ujjwal
    Rahman, M. Tanjidur
    Asadizanjani, Navid
    Duvalsaint, Danielle
    Blanton, R. D. Shawn
    2020 IEEE 38TH VLSI TEST SYMPOSIUM (VTS 2020), 2020,
  • [2] A Survey on Logic-Locking Characteristics and Attacks
    Subbiah K.
    Chinnathevar S.
    Journal of The Institution of Engineers (India): Series B, 2024, 105 (04) : 1073 - 1087
  • [3] ENTANGLE: An Enhanced Logic-locking Technique for Thwarting SAT and Structural Attacks
    Darjani, Armin
    Kavand, Nima
    Rai, Shubham
    Wijtvliet, Mark
    Kumar, Akash
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 147 - 151
  • [4] A Novel Probability-Based Logic-Locking Technique: ProbLock
    Yue, Michael
    Tehranipoor, Sara
    SENSORS, 2021, 21 (23)
  • [5] Removal Attacks on Logic Locking and Camouflaging Techniques
    Yasin, Muhammad
    Mazumdar, Bodhisatwa
    Sinanoglu, Ozgur
    Rajendran, Jeyavijayan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 517 - 532
  • [6] Shielding Logic Locking from Redundancy Attacks
    Li, Leon
    Orailoglu, Alex
    2019 IEEE 37TH VLSI TEST SYMPOSIUM (VTS), 2019,
  • [7] A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic
    Geraldine Shirley Nicholas
    Ali Shuja Siddiqui
    Sam Reji Joseph
    Gregory Williams
    Fareena Saqib
    Journal of Hardware and Systems Security, 2021, 5 (3-4) : 260 - 268
  • [8] On the Security of Sequential Logic Locking Against Oracle-Guided Attacks
    Hu, Yinghua
    Zhang, Yuke
    Yang, Kaixin
    Chen, Dake
    Beerel, Peter A.
    Nuzzo, Pierluigi
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (11) : 3628 - 3641
  • [9] SAT and SCOPE Attacks on Deceptive Multiplexer Logic Locking
    Gandhi, Jugal
    Agarwal, Rishi
    Mall, Anish
    Shekhawat, Diksha
    Santosh, M.
    Pnadey, Jai Gopal
    PROCEEDINGS OF THE 37TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, VLSID 2024 AND 23RD INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, ES 2024, 2024, : 547 - 552
  • [10] Logic Locking Induced Fault Attacks
    Brunner, Michaela
    Gruber, Michael
    Tempelmeier, Michael
    Sigl, Georg
    2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 114 - 119