Predictive Model Attack for Embedded FPGA Logic Locking

被引:5
|
作者
Chowdhury, Prattay [1 ]
Sathe, Chaitali G. [1 ]
Schafer, Benjamin Carrion [1 ]
机构
[1] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75083 USA
来源
2022 ACM/IEEE INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, ISLPED 2022 | 2022年
关键词
Hardware Security; Logic Locking; Hardware Redaction; FPGA; High-Level Synthesis; Machine Learning; OBFUSCATION;
D O I
10.1145/3531437.3539728
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With most VLSI design companies now being fabless it is imperative to develop methods to protect their Intellectual Property (IP). One approach that has become very popular due to its relative simplicity and practicality is logic locking. One of the problems with traditional locking mechanisms is that the locking circuitry is built into the netlist that the VLSI design company delivers to the foundry which has now access to the entire design including the locking mechanism. This implies that they could potentially tamper with this circuitry or reverse engineer it to obtain the locking key. One relatively new approach that has been coined logic locking through omission, or hardware redaction, maps a portion of the design to an embedded FPGA (eFPGA). The bitstream of the eFPGA now acts as the locking key. This new approach has been shown to be more secure as the foundry has no access to the bitstream during the manufacturing stage. The obvious drawbacks are the increase in design complexity and the area and performance overheads associated with the eFPGA. In this work we propose, to the best of our knowledge, the first attack on these type of new locking mechanisms by substituting the exact logic mapped onto the eFPGA by a synthesizable predictive model that replicates the behavior of the exact logic. We show that this approach is applicable in the context of approximate computing where hardware accelerators tolerate certain degree of errors at their outputs. Experimental results show that our proposed approach is very effective finding suitable predictive models while simultaneously reducing the overall power consumption.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking
    Alrahis, Lilas
    Patnaik, Satwik
    Shafique, Muhammad
    Sinanoglu, Ozgur
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) : 1602 - 1606
  • [22] Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques
    Limaye, Nimisha
    Patnaik, Satwik
    Sinanoglu, Ozgur
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 744 - 759
  • [23] SAIL: Analyzing Structural Artifacts of Logic Locking Using Machine Learning
    Chakraborty, Prabuddha
    Cruz, Jonathan
    Alaql, Abdulrahman
    Bhunia, Swarup
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3828 - 3842
  • [24] CoLA: Convolutional Neural Network Model for Secure Low Overhead Logic Locking Assignment
    Aghamohammadi, Yeganeh
    Rezaei, Amin
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 339 - 344
  • [25] LOKI: A Secure FPGA Prototyping of IoT IP with Lightweight Logic Locking
    Gandhi, Jugal
    Shekhawat, Diksha
    Santosh, M.
    Pandey, Jai Gopal
    2023 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS, 2024, : 85 - 89
  • [26] LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking
    Aghamohammadi, Yeganeh
    Rezaei, Amin
    29TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2024, 2024, : 606 - 611
  • [27] Redundancy Attack: Breaking Logic Locking Through Oracleless Rationality Analysis
    Li, Leon
    Orailoglu, Alex
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (04) : 1044 - 1057
  • [28] Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators
    Xu, Hongye
    Liu, Dongfang
    Merkel, Cory
    Zuzak, Michael
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 351 - 356
  • [29] Removal Attacks on Logic Locking and Camouflaging Techniques
    Yasin, Muhammad
    Mazumdar, Bodhisatwa
    Sinanoglu, Ozgur
    Rajendran, Jeyavijayan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 517 - 532
  • [30] FSMLock: Sequential Logic Locking through Encryption
    Krebs, Matthew
    Lukowiak, Marcin
    Farris, Steve
    Kurdziel, Michael
    2024 31ST INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEM, MIXDES 2024, 2024, : 98 - 103