Classical Cryptanalysis Attacks on Logic Locking Techniques

被引:0
作者
Bodhisatwa Mazumdar
Soma Saha
Ghanshyam Bairwa
Souvik Mandal
Tatavarthy Venkat Nikhil
机构
[1] Indian Institute of Technology Indore,Discipline of Computer Science and Engineering
[2] SGSITS Indore,Department of Computer Science and Engineering
来源
Journal of Electronic Testing | 2019年 / 35卷
关键词
Logic locking; Key gate; Linear approximation; Input differential; Output differential;
D O I
暂无
中图分类号
学科分类号
摘要
Logic locking is a protection technique for outsourced integrated circuit (IC) designs that thwarts IC piracy and IC counterfeiting by untrusted foundries. In this technique, the IC design house locks the correct functionality of the circuit using a key that is known only to the trusted entities in the design house. As the correct key values are provided by the design house after production, a malicious adversary in the foundry house will not be able to unlock overproduced or counterfeit ICs. In this paper, we mount linear approximation attacks and differential attacks on random logic locking (RLL), fault-analysis based logic locking (FLL), and strong logic locking (SLL) techniques. We present a formal approach to mount the linear approximation attack on multiple circuit partitions and thereafter combining the approximations to form the attack on a locked logic cone of the circuit. We present our results on ISCAS’85 benchmark circuits. In linear approximation attack, the combinatorial blocks are partitioned and expressed as linear expressions to derive a relation between the primary inputs and the primary outputs of the circuit. The attack aims to determine the linear approximation that has the highest probability of occurrence for the correct key input. In differential attacks, we could recover the embedded secret key in device with attack effort lesser than exhaustive search attack.
引用
收藏
页码:641 / 654
页数:13
相关论文
共 20 条
  • [1] Abdel-Hamid AT(2004)A survey on IP watermarking techniques Design Automation for Embedded Systems 9 211-89
  • [2] Tahar S(2015)Solving the third-shift problem in ic piracy with test-aware logic locking IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34 961-424
  • [3] Aboulhamid EM(2012)Security analysis of logic obfuscation DAC Design Automation Conference 2012 83-undefined
  • [4] Plaza SM(2015)Fault Analysis-Based Logic Encryption IEEE Transactions on Computers 64 410-undefined
  • [5] Markov IL(2016)On improving the security of logic locking IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 35 1411-undefined
  • [6] Rajendran J(undefined)undefined undefined undefined undefined-undefined
  • [7] Pino Y(undefined)undefined undefined undefined undefined-undefined
  • [8] Sinanoglu O(undefined)undefined undefined undefined undefined-undefined
  • [9] Karri R(undefined)undefined undefined undefined undefined-undefined
  • [10] Rajendran Jeyavijayan(undefined)undefined undefined undefined undefined-undefined