UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction

被引:16
作者
Alrahis, Lilas [1 ]
Patnaik, Satwik [2 ]
Hanif, Muhammad Abdullah [3 ]
Shafique, Muhammad [1 ]
Sinanoglu, Ozgur [1 ]
机构
[1] New York Univ Abu Dhabi, Div Engn, Abu Dhabi, U Arab Emirates
[2] Texas A&M Univ, Elect & Comp Engn, College Stn, TX USA
[3] Tech Univ Wien, Inst Comp Engn, Vienna, Austria
来源
2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD) | 2021年
关键词
Logic locking; Routing obfuscation; Link prediction; Oracle-less attacks; Graph neural networks; SECURITY; LOCKING; ATTACKS;
D O I
10.1109/ICCAD51958.2021.9643476
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Logic locking aims to prevent intellectual property (IP) piracy and unauthorized overproduction of integrated circuits (ICs). However, initial logic locking techniques were vulnerable to the Boolean satisfiability (SAT)-based attacks. In response, researchers proposed various SAT-resistant locking techniques such as point function-based locking and symmetric interconnection (SAT-hard) obfuscation. We focus on the latter since point function-based locking suffers from various structural vulnerabilities. The SAT-hard logic locking technique, InterLock [1], achieves a unified logic and routing obfuscation that thwarts state-of-the-art attacks on logic locking. In this work, we propose a novel link prediction-based attack, UNTANGLE, that successfully breaks InterLock in an oracle-less setting without having access to an activated IC (oracle). Since InterLock hides selected timing paths in key-controlled routing blocks, UNTANGLE reveals the gates and interconnections hidden in the routing blocks upon formulating this task as a link prediction problem. The intuition behind our approach is that ICs contain a large amount of repetition and reuse cores. Hence, UNTANGLE can infer the hidden timing paths by learning the composition of gates in the observed locked netlist or a circuit library leveraging graph neural networks. We show that circuits withstanding SAT-based and other attacks can be unlocked in seconds with 100% precision using UNTANGLE in an oracle-less setting. UNTANGLE is a generic attack platform (which we also open source [2]) that applies to multiplexer (MUX)-based obfuscation, as demonstrated through our experiments on ISCAS-85 and ITC-99 benchmarks locked using InterLock and random MUX-based locking.
引用
收藏
页数:9
相关论文
共 43 条
  • [1] Friends and neighbors on the Web
    Adamic, LA
    Adar, E
    [J]. SOCIAL NETWORKS, 2003, 25 (03) : 211 - 230
  • [2] Alaql A., 2019, ASIANHOST, P1
  • [3] SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking
    Alaql, Abdulrahman
    Rahman, Md Moshiur
    Bhunia, Swarup
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (08) : 1529 - 1542
  • [4] Alrahis L, 2019, IEEE Transactions on Emerging Topics in Computing, P1
  • [5] GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking
    Alrahis, Lilas
    Patnaik, Satwik
    Khalid, Faiq
    Hanif, Muhammad Abdullah
    Saleh, Hani
    Shafique, Muhammad
    Sinanoglu, Ozgur
    [J]. PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 780 - 785
  • [6] UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking
    Alrahis, Lilas
    Patnaik, Satwik
    Knechtel, Johann
    Saleh, Hani
    Mohammad, Baker
    Al-Qutayri, Mahmoud
    Sinanoglu, Ozgur
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2508 - 2523
  • [7] ScanSAT: Unlocking Obfuscated Scan Chains
    Alrahis, Lilas
    Yasin, Muhammad
    Saleh, Hani
    Mohammad, Baker
    Al-Qutayri, Mahmoud
    Sinanoglu, Ozgur
    [J]. 24TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2019), 2019, : 352 - 357
  • [8] Alrahis L, 2019, IEEE INT SYMP CIRC S
  • [9] Azar K. Z., 2020, 2020 IEEE ACM INT C, P1
  • [10] Azar K. Z., 2020, 2020 IEEEACM INT C C, P1