[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering Attacks

Published: 08 June 2020 Publication History

Abstract

Untrusted foundries pose threats of integrated circuit (IC) piracy and counterfeiting, and this has motivated research into logic locking. Strong logic locking approaches potentially prevent piracy and counterfeiting by preventing unauthorized replication and use of ICs. Unfortunately, recent work has shown that most state-of-the-art logic locking techniques are vulnerable to attacks that utilize Boolean Satisfiability (SAT) solvers.
In this article, we extend our prior work on using silicon nanowire (SiNW) field-effect transistors (FETs) to produce obfuscated ICs that are resistant to reverse engineering attacks, such as the sensitization attack, SAT and approximate SAT attacks, as well as tracked signal attacks. Our method is based on exchanging some logic gates in the original design with a set of polymorphic gates (PLGs), designed using SiNW FETs, and augmenting the circuit with a small block, whose output is untraceable, namely, URSAT. The URSAT may not offer very strong resilience against the combined AppSAT-removal attack. Strong URSAT is achieved using only CMOS-logic gates, namely, S-URSAT. The proposed technique, S-URSAT + PLG-based traditional encryption, designed using SiNW FETs, increases the security level of the design to robustly thwart all existing attacks, including combined AppSAT-removal attack, with small penalties. Then, we evaluate the effectiveness of our proposed methods and subject it to a thorough security analysis. We also evaluate the performance penalty of the technique and find that it results in very small overheads in comparison to other works. The average area, power, and delay overheads of implementing 64 baseline key-bits of S-URSAT for small benchmarks are 5.03%, 2.60%, and −2.26%, respectively, while for large benchmarks they are 2.37%, 1.18%, and −1.93%.

References

[1]
P. Subramanyan, N. Tsiskaridze, W. Li, A. Gascón, W. Tan, A. Tiwari, N. Shankar, S. Seshia, and S. Malik. 2014. Reverse engineering digital circuits using structural and functional analyses. IEEE Trans. Emerg. Topics Comput. 2, 1 (2014).
[2]
Ujjwal Guin, Qihang Shi, Domenic Forte, and Mark M. Tehranipoor. 2016. FORTIS: A comprehensive solution for establishing forward trust for protecting IPs and ICs. ACM Trans. Des. Autom. Electron. Syst. 21, 4 (2016).
[3]
B. Shakya, N. Asadizanjani, D. Forte, and M. Tehranipoor. 2016. Chip editor: Leveraging circuit edit for logic obfuscation and trusted fabrication. In Proceedings of the IEEE International Conference on Computer-Aided Design.
[4]
SEMI. 2008. Innovation is at risk as semiconductor equipment and materials industry loses up to $ 4 billion annually due to IP infringement. www.semi.org/en.
[5]
Global Intelligent Property Center U.S. Chamber of Commerce (GIPC). 2016. Measuring the magnitude of global counterfeiting. U.S. Chamber of Commerce. https://www.uschamber.com/sites/default/files/documents/files/measuringthemagnitudeofglobalcounterfeiting.pdf.
[6]
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri. Logic encryption: A fault analysis perspective. In Proceedings of the Design, Automation and Test in Europe Conference (DATE’12).
[7]
Amin Rezaei, Yuanqi Shen, and Hai Zhou. 2019. Rescuing logic encryption in post-SAT era by locking and obfuscation. In Cryptology ePrint Archive, Report 2019/1463. Retrieved from https://eprint.iacr.org/2019/1463.
[8]
J. A. Roy, F. Koushanfar, and I. L. Markov. 2008. EPIC: Ending piracy of integrated circuits. In Proceedings of the Design, Automation and Test in Europe Conference.
[9]
J. A. Roy and F. Koushanfar and I. L. Markov. 2010. Ending piracy of integrated circuits. Computer 43, 10 (2010).
[10]
J. Rajendran, H. Zhang, C. Zhang, G. S. Rose, Y. Pino, O. Sinanoglu, and R. Karri. 2015. Fault analysis-based logic encryption. IEEE Trans. Comput. 64, 2 (2015).
[11]
Qutaiba Alasad et al. 2017. E2LEMI: Energy-efficient logic encryption using multiplexer insertion. Electronics 6 (2017).
[12]
Q. Alasad, J. Yuan, and Y. Bi. 2017. Logic locking using hybrid CMOS and emerging SiNW FETs. Electronics 6 (2017).
[13]
J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri. 2012. Security analysis of logic obfuscation. In Proceedings of the Design Automation Conference.
[14]
P. Subramanyan, S. Ray, and S. Malik. 2015. Evaluating the security of logic encryption algorithms. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST’15).
[15]
Yang Xie and Ankur Srivastava. 2016. Mitigating SAT attack on logic locking. In Proceedings of the Conference on Cryptographic Hardware and Embedded Systems.
[16]
M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran. 2018. Removal attacks on logic locking and camouflaging techniques. IEEE Trans. Emerg. Topics Comput. 1, 1 (2018).
[17]
K. Shamsi, M. Li, T. Meade, Z. Zhao, D. Z. Pan, and Y. Jin. 2017. AppSAT: Approximately deobfuscating integrated circuits. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST’17).
[18]
Y. Xie and A. Srivastava. 2018. Anti-SAT: Mitigating SAT attack on logic locking. IEEE Trans. Comput.-Aided Des. Integ. Circ. Syst. 38, 2 (2018).
[19]
M. Yasin, B. Mazumdar, J. J. V. Rajendran, and O. Sinanoglu. 2016. SARLock: SAT attack resistant logic locking. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST’16).
[20]
Muhammad Yasinet al.2017. What to lock?: Functional and parametric locking. In Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI’17).
[21]
M. Nabeel M. Ashraf J. Rajendran M. Yasin, A. Sengupta and O. Sinanoglu. 2017. Provably-secure logic locking: From theory to practice. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’17).
[22]
Q. Alasad and J. Yuan. 2017. Logic obfuscation against IC reverse engineering attacks using PLGs. In Proceedings of the IEEE International Conference on Computer Design.
[23]
J. Appenzeller, J. Knoch, E. Tutuc, M. Reuter, and S. Guha. 2006. Dual-gate silicon nanowire transistors with nickel silicide contacts. In Proceedings of the International Electron Devices Meeting (IEDM’06). 1--4.
[24]
M. D. Marchi, J. Zhang, S. Frache, D. Sacchetto, P. Gaillardon, Y. Leblebici, and G. D. Micheli. 2014. Configurable logic gates using polarity-controlled silicon nanowire gate-all-around FETs. IEEE Electron Dev. Lett. 35, 8 (2014).
[25]
M. De Marchi, D. Sacchetto, S. Frache, J. Zhang, P. E. Gaillardon, Y. Leblebici, and G. De Micheli. 2012. Polarity control in double-gate, gate-all-around vertically stacked silicon nanowire FETs. In Proceedings of the International Electron Devices Meeting.
[26]
Qutaiba Alasad, Jiann Yuan, and Deliang Fan. 2017. Leveraging all-spin logic to improve hardware security. In Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI’17).
[27]
H. Zhou. 2017. A humble theory and application for logic encryption. Cryptol. ePrint Arch. 2017, 1 (2017).
[28]
Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, and David Z. Pan. 2016. Provably secure camouflaging strategy for IC protection. In Proceedings of the 35th International Conference on Control, Automation and Diagnosis.
[29]
Yuanqi Shen and Hai Zhou. 2017. Double DIP: Re-evaluating security of logic encryption algorithms. In Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI’17).
[30]
Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, and Domenic Forte. 2017. Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks. In Proceedings of the Conference on Cryptographic Hardware and Embedded Systems.
[31]
D. Sirone and P. Subramanyan. 2019. Functional analysis attacks on logic locking. In Design, Automation and Test in Europe Conference (DATE’19). 936--939.
[32]
D. Sirone and P. Subramanyan. 2018. Functional analysis attacks on logic locking. arXiv preprint arXiv:1811.12088.
[33]
A. Sengupta et al. 2018. ATPG-based cost-effective, secure logic locking. In Proceedings of the IEEE 36th VLSI Test Symposium (VTS’18).
[34]
Abhrajit Sengupta, Mohammed Nabeel, Mohammed Ashraf, and Ozgur Sinanoglu. 2018. Customized locking of IP blocks on a multi-million-gate SoC. In Proceedings of the International Conference on Computer-Aided Design.
[35]
Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin. 2017. Cyclic obfuscation for creating SAT-unresolvable circuits. In Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI’17).
[36]
Hai Zhou, Ruifeng Jiang, and Shuyu Kong. 2017. CycSAT: SAT-based attack on cyclic logic encryptions. In Proceedings of the 36th International Conference on Computer-Aided Design (ICCAD’17).
[37]
Y. Xie and A. Srivastava. 2017. Delay locking: Security enhancement of logic locking against IC counterfeiting and overproduction. In Proceedings of the 54th ACM/EDAC/IEEE Design Automation Conference (DAC’17).
[38]
A. Chakraborty, Y. Liu, and A. Srivastava. 2018. TimingSAT: Timing profile embedded SAT attack. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 1--6.
[39]
Kimia Zamiri Azar et al. 2019. SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks. IACR Trans. Crypto. Hardw. Embed. Syst. 2019, 1 (2019).
[40]
Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, and Avesta Sasan. 2019. Threats on logic locking: A decade later. In Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI’19).
[41]
Pim Tuyls, Geert-Jan Schrijen, Boris Škorić, Jan van Geloven, Nynke Verhaegh, and Rob Wolters. 2006. Read-proof hardware from protective coatings. In Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems (CHES'06), vol 4249. Springer-Verlag, Berlin.
[42]
G. K. Contreras, M. T. Rahman, and M. Tehranipoor. 2013. Secure split-test for preventing IC piracy by untrusted foundry and assembly. In Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems.
[43]
H. Wang, D. Forte, M. M. Tehranipoor, and Q. Shi. 2017. Probing attacks on integrated circuits: Challenges and research opportunities. IEEE Des. Test 34, 5 (Oct. 2017), 63--71.
[44]
H. Wang, Qihang Shi Shi, Adib Nahiyan, D. Forte, and Mark M. Tehranipoor. 2019. A physical design flow against front-side probing attacks by internal shielding. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. 2019, 1 (2019).
[45]
H. Wang, Q. Shi, D. Forte, and M. M. Tehranipoor. 2019. Probing assessment framework and evaluation of antiprobing solutions. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 27, 6 (2019).
[46]
S. Skorobogatov and Ch. Woods. 2012. In the blink of an eye: There goes your AES key. IACR Crypto. ePrint 2012, 1 (2012).
[47]
F. Courbon, S. Skorobogatov, and Ch. Woods. 2016. Direct charge measurement in floating gate transistors of flash EEPROM using scanning electron microscopy. In Proceedings of the 32nd Information Science, Technology and Applications Conference.
[48]
Swarup Bhunia and Mark Tehranipoo. 2019. Physical attacks and countermeasures. In Hardware Security: A Hands-on Learning Approach. Elsevier Inc., 246--282.
[49]
J. Alasad, Q. Taheri, S. Yuan, and J.-S. Lin. 2017. Ultra-low-power design and hardware security using emerging technologies for Internet of Things. Electronics 6 (2017).
[50]
A. Stoica et al. 2004. Taking evolutionary circuit design from experimentation to implementation: Some useful techniques and a silicon demonstration. In Proceedings of the IEEE Computers and Digital Techniques Conference.
[51]
Adrian Stoica, Ricardo S. Zebulum, and Didier Keymeulen. 2001. Polymorphic electronics. In Proceedings of the 4th International Conference on Evolvable Systems: From Biology to Hardware (ICES’01).
[52]
R. Ruzicka. 2007. New polymorphic NAND/XOR gate. In Proceedings of 7th WSEAS International Conference on Applied Computer Science. Citeseer.
[53]
K. Huang and R. Zhao. 2016. Magnetic domain-wall racetrack memory-based nonvolatile logic for low-power computing and fast run-time-reconfiguration. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 24, 9 (2016).
[54]
F. Parveen, Z. He, S. Angizi, and D. Fan. 2017. Hybrid polymorphic logic gate with 5-terminal magnetic domain wall motion device. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI’17).
[55]
Y. Zhang, B. Yan, W. Wu, H. Li, and Y. Chen. 2015. Giant spin hall effect (GSHE) logic design for low power application. In Proceedings of the Design, Automation and Test in Europe Conference (DATE’15). 1000--1005.
[56]
S. Patnaik, N. Rangarajan, J. Knechtel, O. Sinanoglu, and S. Rakheja. 2018. Advancing hardware security using polymorphic and stochastic spin-hall effect devices. In Proceedings of the Design, Automation and Test in Europe Conference (DATE’18).
[57]
Arman Roohi, Ramtin Zand, and Ronald F. DeMara. 2018. Logic-encrypted synthesis for energy-harvesting-powered spintronic-embedded datapath design. In Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI’18).
[58]
T. Winograd, H. Salmani, H. Mahmoodi, K. Gaj, and H. Homayoun. 2016. Hybrid STT-CMOS designs for reverse-engineering prevention. In Proceedings of the 53rd ACM/EDAC/IEEE Design Automation Conference (DAC’16).
[59]
J. Yang, X. Wang, Q. Zhou, Z. Wang, H. Li, Y. Chen, and W. Zhao. 2019. Exploiting spin-orbit torque devices as reconfigurable logic for circuit obfuscation. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. 38, 1 (2019).
[60]
S. Angizi, H. Jiang, R. F. DeMara, J. Han, and D. Fan. 2018. Majority-based spin-CMOS primitives for approximate computing. IEEE Trans. Nanotech. 17, 4 (2018).
[61]
D. Nikonov, C. Lin, S. Manipatruni et al. 2019. Scalable energy-efficient magnetoelectric spin--orbit logic. Nature 565, 3 (2019).
[62]
S. Patnaik, N. Rangarajan, J. Knechtel, O. Sinanoglu, and S. Rakheja. 2019. Spin-orbit torque devices for hardware security: From deterministic to probabilistic regime. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. 2019, 1 (2019).
[63]
M. Marchi, D. Sacchetto, J. Zhang, S. Frache, P. Gaillardon, Y. Leblebici, and G. Micheli. 2014. Top-down fabrication of gate-all-around vertically stacked silicon nanowire FETs with controllable polarity. IEEE Trans. Nanotech. 13, 6 (2014).
[64]
F. Brglez and H. Fujiwara. 1985. A neutral netlist of 10 combinational benchmark circuits and a target translator in FORTRAN. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’85). IEEE Press, Piscataway, N.J.
[65]
F. Brglez, D. Bryan, and K. Kozminski. 1989. Combinational profiles of sequential benchmark circuits. In Proceedings of the IEEE International Symposium on Circuits and Systems, Vol. 3. 1929--1934.
[66]
F. Corno, M. S. Reorda, and G. Squillero. 2000. RT-level ITC'99 benchmarks and first ATPG results. IEEE Design and Test of Computers 17, 3 (2000).
[67]
Robert Brayton and Alan Mishchenko. 2010. ABC: An academic industrial-strength verification tool. In Computer Aided Verification, Tayssir Touili, Byron Cook, and Paul Jackson (Eds.), Vol. 6174. Springer, Berlin, Heidelberg.
[68]
P. Gaillardon, L. Amaru, J. Zhang, and G. De Micheli. 2014. Advanced system on a chip design based on controllable-polarity FETs. In Proceedings of the Design, Automation and Test in Europe Conference (DATE’14).
[69]
Qutaiba Alasad et al. 2018. Resilient AES against side-channel attack using all-spin logic. In Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI’18).
[70]
Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Advances in Cryptology, Michael Wiener (Ed.). Springer Berlin, 388--397.
[71]
Joshua Jaffe Paul Kocher and Benjamin Jun. 1998. Introduction to differential power analysis and related attacks. Retrieved from http://www.cryptography.com/dpa/technical.
[72]
Shahin Tajik et al. 2017. On the power of optical contactless probing: Attacking bitstream encryption of FPGAs. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.
[73]
Y. Bi, K. Shamsi, J. Yuan, F. Standaert, and Y. Jin. 2016. Leverage emerging technologies for DPA-resilient block cipher design. In Proceedings of the Design, Automation and Test in Europe Conference (DATE’16). 1538--1543.
[74]
M. N. I. Khan, S. Bhasin, A. Yuan, A. Chattopadhyay, and S. Ghosh. 2017. Side-channel attack on STTRAM based cache for cryptographic application. In Proceedings of the IEEE International Conference on Computer Design (ICCD’17).

Cited By

View all
  • (2024)A Review of Test Stimulus Compression Methods for Ultra-Large-Scale Integrated CircuitsApplied Sciences10.3390/app14231076914:23(10769)Online publication date: 21-Nov-2024
  • (2024)Satisfiability Attack-Resilient Camouflaged Multiple Multivariable Logic-in-Memory Exploiting 3D NAND Flash ArrayIEEE Transactions on Circuits and Systems I: Regular Papers10.1109/TCSI.2023.332633271:2(660-669)Online publication date: Feb-2024
  • (2024)SECT-HI: Enabling Secure Testing for Heterogeneous Integration to Prevent SiP Counterfeits2024 IEEE International Test Conference (ITC)10.1109/ITC51657.2024.00051(303-312)Online publication date: 3-Nov-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Design Automation of Electronic Systems
ACM Transactions on Design Automation of Electronic Systems  Volume 25, Issue 4
July 2020
153 pages
ISSN:1084-4309
EISSN:1557-7309
DOI:10.1145/3402047
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 08 June 2020
Online AM: 07 May 2020
Accepted: 01 April 2020
Revised: 01 March 2020
Received: 01 June 2019
Published in TODAES Volume 25, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Hardware security
  2. SiNW FETs
  3. logic encryption
  4. reverse engineering attacks and defenses

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Cyber Florida

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)3
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Review of Test Stimulus Compression Methods for Ultra-Large-Scale Integrated CircuitsApplied Sciences10.3390/app14231076914:23(10769)Online publication date: 21-Nov-2024
  • (2024)Satisfiability Attack-Resilient Camouflaged Multiple Multivariable Logic-in-Memory Exploiting 3D NAND Flash ArrayIEEE Transactions on Circuits and Systems I: Regular Papers10.1109/TCSI.2023.332633271:2(660-669)Online publication date: Feb-2024
  • (2024)SECT-HI: Enabling Secure Testing for Heterogeneous Integration to Prevent SiP Counterfeits2024 IEEE International Test Conference (ITC)10.1109/ITC51657.2024.00051(303-312)Online publication date: 3-Nov-2024
  • (2023)Increasing SAT-Resilience of Logic Locking Mechanisms using Formal Methods2023 IEEE European Test Symposium (ETS)10.1109/ETS56758.2023.10173975(1-6)Online publication date: 22-May-2023
  • (2023)Quality Assessment of Logic Locking Mechanisms using Pseudo-Boolean Optimization Techniques2023 26th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)10.1109/DDECS57882.2023.10139590(105-110)Online publication date: 3-May-2023
  • (2022)Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based MLComputers10.3390/computers1107011511:7(115)Online publication date: 20-Jul-2022
  • (2022)Quality Assessment of RFET-based Logic Locking Protection Mechanisms using Formal Methods2022 IEEE European Test Symposium (ETS)10.1109/ETS54262.2022.9810459(1-2)Online publication date: 23-May-2022
  • (2021)Vertical IP Protection of the Next-Generation Devices: Quo Vadis?2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE51398.2021.9474132(1905-1914)Online publication date: 1-Feb-2021
  • (2021)Resilient and Secure Hardware Devices Using ASLACM Journal on Emerging Technologies in Computing Systems10.1145/342998217:2(1-26)Online publication date: 6-Jan-2021
  • (2021)Invited: End-to-End Secure SoC Lifecycle Management2021 58th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC18074.2021.9586106(1295-1298)Online publication date: 5-Dec-2021
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media