TimingSAT: Timing Profile Embedded SAT Attack

被引:14
作者
Chakraborty, Abhishek [1 ]
Liu, Yuntao [1 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
来源
2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS | 2018年
关键词
D O I
10.1145/3240765.3240857
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to enhance the security of logic obfuscation schemes, delay based logic locking has been proposed in combination with traditional functional logic locking approaches in recent literature. A circuit obfuscated using the aforementioned approach preserves the correct functionality only when both correct functional and delay keys are provided. In this paper, we develop a novel SAT formulation based approach called TimingSAT to deobfuscte the functionalities of such delay locked designs within a reasonable amount of time. The proposed technique models the timing characteristics of various types of gates present in the design as Boolean functions to build timing profile embedded SAT formulations in terms of targeted key inputs. TimingSAT attack works in two stages: In the first stage the functional keys are found using traditional SAT attack approach and in the second stage the delay keys are deciphered utilizing the timing profile embedded SAT formulation of the circuit. In both stages of the attack, wrong keys are iteratively eliminated till a key belonging to the correct equivalence class is obtained. The experimental results highlight the effectiveness of the proposed TimingSAT attack to break delay logic locked benchmarks within few hours.
引用
收藏
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 2016, 2016896 CRYPT EPRINT
[2]  
Baumgarten Alex., 2010, IEEE DESIGN TEST COM
[3]   TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS [J].
Karri, Ramesh ;
Rajendran, Jeyavijayan ;
Rosenfeld, Kurt ;
Tehranipoor, Mohammad .
COMPUTER, 2010, 43 (10) :39-46
[4]  
Pinhong Chen, 1999, 1999 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (Cat. No.99CH37051), P132, DOI 10.1109/ICCAD.1999.810637
[5]   Fault Analysis-Based Logic Encryption [J].
Rajendran, Jeyavijayan ;
Zhang, Huan ;
Zhang, Chi ;
Rose, Garrett S. ;
Pino, Youngok ;
Sinanoglu, Ozgur ;
Karri, Ramesh .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) :410-424
[6]  
Rajendran J, 2012, DES AUT CON, P83
[7]   A Primer on Hardware Security: Models, Methods, and Metrics [J].
Rostami, Masoud ;
Koushanfar, Farinaz ;
Karri, Ramesh .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1283-1295
[8]  
Roy JA, 2008, DES AUT TEST EUROPE, P948
[9]  
Shamsi K., 2017, P IEEE S HARDW OR SE
[10]  
Subramanyan P, 2015, 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P137, DOI 10.1109/HST.2015.7140252