Truly Stripping Functionality for Logic Locking: A Fault-Based Perspective

被引:47
作者
Sengupta, Abhrajit [1 ]
Nabeel, Mohammed [2 ]
Limaye, Nimisha [1 ]
Ashraf, Mohammed [2 ]
Sinanoglu, Ozgur [2 ]
机构
[1] NYU, Tandon Sch Engn, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
[2] New York Univ Abu Dhabi, Div Engn, Abu Dhabi, U Arab Emirates
关键词
IP networks; Solid modeling; Resilience; Security; Tools; Silicon; Load modeling; ATPG; intellectual property (IP) piracy; logic locking; removal; SFLL; HARDWARE;
D O I
10.1109/TCAD.2020.2968898
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Logic locking is a holistic solution to counter manufacturing threats, such as intellectual property (IP) piracy and overbuilding at the hardware level. However, years of research has exposed various flaws in locking, including a Boolean satisfiability (SAT)-based attack. Consequently, several SAT-resilient locking techniques, such as SARLock, Anti-SAT, and SFLL have been proposed, although certain instances of them have also been broken by a class of attacks, called removal attack. In this article, we approach logic locking by leveraging well-known principles from very large-scale integration (VLSI) testing and elicit logic locking properties that dictate the resilience of a locking technique against different attacks. We present a revised version of SFLL, namely SFLL-rem, that not only retains all security properties of SFLL, delivering resilience to all the state-of-the-art attacks SFLL can thwart, but also to the latest removal attacks that broke some SFLL instances. Further, we develop a security-aware CAD framework integrated with industry tools that incurs only -1.5%, 0%, and 4.13% overhead for power, performance, and area, respectively. We demonstrate a silicon implementation of SFLL-rem on ARM Cortex-M0 microprocessor in 65 nm. Moreover, we provide a framework for an SoC designer to customize logic locking based on the SoC blocks and their threat models; this is illustrated by locking a multimillion-gate SoC provided by DARPA, and taking the SoC all the way to GDSII layout.
引用
收藏
页码:4439 / 4452
页数:14
相关论文
共 41 条
[1]  
[Anonymous], 2012, Intel's 22-nm trigate transistors exposed
[2]  
[Anonymous], 2013, Cortex-M0 Processor
[3]  
[Anonymous], 2012, iPhone 5 A6 SoC reverse engineered, reveals rare hand-made custom CPU
[4]  
[Anonymous], 2013, Detecting and Removing Counterfeit Semiconductors in the U.S. Supply Chain
[5]  
[Anonymous], 2008, INNOVATION IS RISK S
[6]  
[Anonymous], 2018, Common evaluation platform
[7]  
[Anonymous], 2018, The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
[8]  
[Anonymous], 2012, ECRYPT 2 YEARLY REPO
[9]  
[Anonymous], 2017, SAMS GAL S8 SM G950W
[10]  
[Anonymous], 2019, CSAW'19 Logic Locking Conquest