TGA: An Oracle-less and Topology-Guided Attack on Logic Locking

被引:21
作者
Zhang, Yuqiao [1 ]
Cui, Pinchen [1 ]
Zhou, Ziqi [1 ]
Guin, Ujjwal [1 ]
机构
[1] Auburn Univ, Auburn, AL 36849 USA
来源
PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19) | 2019年
基金
美国国家科学基金会;
关键词
Logic locking; Boolean functions; overproduction; directed graph; depth-first search; PIRACY;
D O I
10.1145/3338508.3359576
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the outsourcing of semiconductor design and manufacturing, a number of threats have emerged in recent years, and they are overproduction of integrated circuits (ICs), illegal sale of defective ICs, and piracy of intellectual properties (IPs). Logic locking is one method to enable trust in this complex IC design and manufacturing processes, where a design is obfuscated by inserting a lock to modify the underlying functionality so that an adversary cannot make a chip to function properly. A locked chip will only work properly once it is activated by programming with a secret key into its tamper-proof memory. Over the years, researchers have proposed different locking mechanisms primarily to prevent Boolean satisfiability (SAT)-based attacks, and successfully preserve the security of a locked design. However, an untrusted foundry, the adversary, can use many other effective means to find out the secret key. In this paper, we present a novel oracle-less and topology-guided attack denoted as TGA. The attack relies on identifying repeated functions for determining the value of a key bit. The proposed attack does not require any data from an unlocked chip, and eliminates the need for an oracle. The attack is based on self-referencing, i.e., it compares the internal netlist to find the key. The proposed graph search algorithm efficiently finds a duplicate function of the locked part of the circuit. Our proposed attack correctly estimate a key bit very efficiently, and it only takes few seconds to determine the key bit. We also present a solution to thwart TGA and make logic locking secure.
引用
收藏
页码:75 / 83
页数:9
相关论文
共 45 条
  • [1] Subtree Isomorphism Revisited
    Abboud, Amir
    Backurs, Arturs
    Hansen, Thomas Dueholm
    Williams, Virginia Vassilevska
    Zamir, Or
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2018, 14 (03)
  • [2] Alkabani Y, 2007, IEEE IC CAD, P674
  • [3] Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
  • [4] Preventing IC Piracy Using Reconfigurable Logic Barriers
    Baumgarten, Alex
    Tyagi, Akhilesh
    Zambreno, Joseph
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 66 - 75
  • [5] Bryan D., 1985, The iscas'85 benchmark circuits and netlist format, P25
  • [6] IPP@HDL: Efficient intellectual property protection scheme for IP cores
    Castillo, Encarnacion
    Meyer-Baese, Uwe
    Garcia, Antonio
    Parrilla, Luis
    Lloris, Antonio
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (05) : 578 - 591
  • [7] Chakraborty Rajat Subhra, 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), P674, DOI 10.1109/ICCAD.2008.4681649
  • [8] HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2009, 28 (10) : 1493 - 1502
  • [9] Hierarchical watermarking in IC design
    Charbon, E
    [J]. IEEE 1998 CUSTOM INTEGRATED CIRCUITS CONFERENCE - PROCEEDINGS, 1998, : 295 - 298
  • [10] Cormen T. H., 2009, Introduction to algorithms, VThird