Classical Cryptanalysis Attacks on Logic Locking Techniques

被引:0
作者
Mazumdar, Bodhisatwa [1 ]
Saha, Soma [2 ]
Bairwa, Ghanshyam [1 ]
Mandal, Souvik [1 ]
Nikhil, Tatavarthy Venkat [1 ]
机构
[1] Indian Inst Technol Indore, Discipline Comp Sci & Engn, Indore, India
[2] SGSITS Indore, Dept Comp Sci & Engn, Indore, India
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2019年 / 35卷 / 05期
关键词
Logic locking; Key gate; Linear approximation; Input differential; Output differential;
D O I
10.1007/s10836-019-05838-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Logic locking is a protection technique for outsourced integrated circuit (IC) designs that thwarts IC piracy and IC counterfeiting by untrusted foundries. In this technique, the IC design house locks the correct functionality of the circuit using a key that is known only to the trusted entities in the design house. As the correct key values are provided by the design house after production, a malicious adversary in the foundry house will not be able to unlock overproduced or counterfeit ICs. In this paper, we mount linear approximation attacks and differential attacks on random logic locking (RLL), faultanalysis based logic locking (FLL), and strong logic locking (SLL) techniques. We present a formal approach to mount the linear approximation attack on multiple circuit partitions and thereafter combining the approximations to form the attack on a locked logic cone of the circuit. We present our results on ISCAS'85 benchmark circuits. In linear approximation attack, the combinatorial blocks are partitioned and expressed as linear expressions to derive a relation between the primary inputs and the primary outputs of the circuit. The attack aims to determine the linear approximation that has the highest probability of occurrence for the correct key input. In differential attacks, we could recover the embedded secret key in device with attack effort lesser than exhaustive search attack.
引用
收藏
页码:641 / 654
页数:14
相关论文
共 22 条
[1]   A survey on IP watermarking techniques [J].
Abdel-Hamid, AT ;
Tahar, S ;
Aboulhamid, EM .
DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2004, 9 (03) :211-227
[2]  
[Anonymous], 2017, IEEE T COMPUTER AIDE
[3]  
[Anonymous], 2016, P INT C COMP AID DES
[4]  
Dupuis S, 2014, IEEE INT ON LINE, P49, DOI 10.1109/IOLTS.2014.6873671
[5]  
Garg S, 2017, 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), P1024, DOI 10.1109/I2CT.2017.8226284
[6]   Anti-Counterfeit Techniques: From Design to Resign [J].
Guin, Ujjwal ;
Forte, Domenic ;
Tehranipoor, Mohammad .
2013 14TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR TEST AND VERIFICATION (MTV): COMMON CHALLENGES AND SOLUTIONS, 2013, :89-94
[7]  
Kakadiaris IA, 2016, ADJUNCT PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON MIXED AND AUGMENTED REALITY (ISMAR-ADJUNCT), P127, DOI [10.1109/ISMAR-Adjunct.2016.0058, 10.1109/ISMAR-Adjunct.2016.51]
[8]   Near-Infrared-Based Nighttime Pedestrian Detection Using Grouped Part Models [J].
Lee, Yi-Shu ;
Chan, Yi-Ming ;
Fu, Li-Chen ;
Hsiao, Pei-Yung .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (04) :1929-1940
[9]   Analysis and Design of Active IC Metering Schemes [J].
Maes, Roel ;
Schellekens, Dries ;
Tuyls, Pim ;
Verbauwhede, Ingrid .
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, :74-81
[10]   Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking [J].
Plaza, Stephen M. ;
Markov, Igor L. .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (06) :961-971