Large-Scale Logic-Locking Attacks via Simulation

被引:1
|
作者
Purdy, Ruben [1 ]
Blanton, R. D. Shawn [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15232 USA
来源
PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022) | 2022年
关键词
Hardware Security; Logic Locking; Obfuscation;
D O I
10.1109/ISQED54688.2022.9806265
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Because IC security has become an increasingly prevalent issue for hardware designers, a number of IC protection schemes have been introduced in the literature. One such scheme, logic locking, involves transforming a hardware design so that it will not operate correctly unless extra inputs (called key inputs) are driven to specific values that are secret. Many existing logic-locking solutions are vulnerable to attacks that uncover the key-input values necessary for correct operation. However, the success of such attacks wane as the size of the design and the number of key inputs increases. In this work, we introduce a logic-locking attack which uses circuit simulators to determine key-input values from large-scale circuits with thousands of added key inputs. Attacks performed on such designs demonstrate the effectiveness of this approach in comparison to other attacks.
引用
收藏
页码:352 / 357
页数:6
相关论文
共 41 条
  • [31] CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer Level
    Yoshimura, Masayoshi
    Tsujikawa, Atsuya
    Hosokawa, Toshinori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (03) : 583 - 591
  • [32] Speeding Up Logic Locking via Fault Emulation and Dynamic Multiple Fault Injection
    Sezer Gören
    Cemil Cem Gürsoy
    Abdullah Yildiz
    Journal of Electronic Testing, 2015, 31 : 525 - 536
  • [33] Speeding Up Logic Locking via Fault Emulation and Dynamic Multiple Fault Injection
    Goren, Sezer
    Gursoy, Cemil Cem
    Yildiz, Abdullah
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2015, 31 (5-6): : 525 - 536
  • [34] A Large-Scale Empirical Study of Android App Decompilation
    Mauthe, Noah
    Kargen, Ulf
    Shahmehri, Nahid
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2021), 2021, : 400 - 410
  • [35] Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
    Dong, Shuaike
    Li, Menghao
    Diao, Wenrui
    Liu, Xiangyu
    Liu, Jian
    Li, Zhou
    Xu, Fenghao
    Chen, Kai
    Wang, XiaoFeng
    Zhang, Kehuan
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 172 - 192
  • [36] Flip-Lock: A Flip-Flop-Based Logic Locking Technique for Thwarting ML-based and Algorithmic Structural Attacks
    Darjani, Armin
    Kavand, Nima
    Kumar, Akash
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 185 - 191
  • [37] Large-Scale Third-Party Library Detection in Android Markets
    Li, Menghao
    Wang, Pei
    Wang, Wei
    Wang, Shuai
    Wu, Dinghao
    Liu, Jian
    Xue, Rui
    Huo, Wei
    Zou, Wei
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2020, 46 (09) : 981 - 1003
  • [38] Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation
    Wang, Pei
    Bao, Qinkun
    Wang, Li
    Wang, Shuai
    Chen, Zhaofeng
    Wei, Tao
    Wu, Dinghao
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 26 - 36
  • [39] CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection
    Wang, Hao
    Gao, Zeyu
    Zhang, Chao
    Sun, Mingyang
    Zhou, Yuchen
    Qiu, Han
    Xiao, Xi
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 149 - 161
  • [40] Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction
    AL-Taharwa, Ismail Adel
    Lee, Hahn-Ming
    Jeng, Albert B.
    Ho, Cheng-Seen
    Wu, Kuo-Ping
    Chen, Shyi-Ming
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 334 - 343