[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Characterization of In-Cone Logic Locking Resiliency Against the SAT Attack

Published: 01 August 2020 Publication History

Abstract

The resiliency of in-cone logic locking techniques to the satisfiability (SAT) attack is characterized in this paper. An analysis of the parameters of the SAT solver that impact security and a characterization of the effect netlist topology has on the security of the circuit is presented. The analysis of SAT solver parameters and logic structure is used to develop three novel logic locking gate selection algorithms based on maximum fanout free cones (MFFCs) and gate controllability for circuits implementing XOR, look-up table (LUT), and <inline-formula> <tex-math notation="LaTeX">$2\times 1$ </tex-math></inline-formula> MUX-based logic obfuscation. The XOR, LUT, and MUX MFFC-based algorithms resulted in an average increase of, respectively, 61.8&#x0025;, 123.6&#x0025;, and 38.5&#x0025; in the minimum number of iterations required to complete the SAT attack across 1,000 different variable orderings of the netlist while applying the locking techniques to 5&#x0025; of the gates within the netlist. In addition, the SAT attack resiliency and output corruption of the developed algorithms are compared with out-of-cone locking techniques.

References

[1]
DigiTimes. (Mar. 2012). Trends in the Global IC Design Service Market. [Online]. Available: http://www.digitimes.com/news/a20120313RS400.html?chid=2
[2]
Trusted Integrated Chips (TIC) Program, IARPA, Riverdale Park, MD, USA, Oct. 2011, pp. 4–5.
[3]
Defense Industrial Base Assessment: Counterfeit Electronics, U.S. Dept. Commerce, Washington, DC, USA, 2010.
[4]
Committee on Armed Services, Inquiry Into Counterfeit Electronics Parts in the Department of Defense Supply Chain. Washington, DC, USA: United States Senate, May 2012.
[5]
S. Skorobogatov and C. Woods, “Breakthrough silicon scanning discovers backdoor in military chip,” in Proc. Int. Conf. Cryptograph. Hardw. Embedded Syst., Leuven, Belgium, Sep. 2012, pp. 23–40.
[6]
R. W. Jarvis and M. G. McIntyre, “Split manufacturing method for advanced semiconductor circuits,” U.S. Patent 7 195 931, 2004.
[7]
J. P. Baukus, L. W. Chow, R. P. Cocchi, P. Ouyang, and B. J. Wang, “Camouflaging a standard cell based integrated circuit,” U.S. Patent 8 151 235, 2012.
[8]
J. P. Baukus, L. W. Chow, R. P. Cocchi, P. Ouyang, and B. J. Wang, “Building block for secure CMOS logic cell library,” U.S. Patent 8 111 089, 2012.
[9]
J. P. Baukus, L. W. Chow, J. Clark, and G. J. Harbison, “Conductive channel pseudo block process and circuit to inhibit reverse engineering,” U.S. Patent 8 258 583, 2012.
[10]
J. A. Roy, F. Koushanfar, and I. L. Markov, “Ending piracy of integrated circuits,” Computer, vol. 43, no. 10, pp. 30–38, Oct. 2010.
[11]
J. Rajendranet al., “Fault analysis-based logic encryption,” IEEE Trans. Comput., vol. 64, no. 2, pp. 410–424, Feb. 2015.
[12]
K. Juretus and I. Savidis, “Reduced overhead gate level logic encryption,” in Proc. IEEE/ACM Great Lakes Symp. VLSI, May 2016, pp. 15–20.
[13]
K. Juretus and I. Savidis, “Reducing logic encryption overhead through gate level key insertion,” in Proc. IEEE Int. Conf. Circuits Syst., May 2016, pp. 1714–1717.
[14]
A. Baumgarten, A. Tyagi, and J. Zambreno, “Preventing IC piracy using reconfigurable logic barriers,” IEEE Des. Test. Comput., vol. 27, no. 1, pp. 66–75, Jan./Feb. 2010.
[15]
P. Subramanyan, S. Ray, and S. Malik, “Evaluating the security of logic encryption algorithms,” in Proc. IEEE Int. Symp. Hardw. Oriented Security Trust, May 2015, pp. 137–143.
[16]
Y. Xie and A. Srivastava, “Mitigating SAT attack on logic locking,” in Proc. Int. Conf. Cryptograph. Hardw. Embedded Syst., Jun. 2016, pp. 127–146.
[17]
M. Yasin, B. Mazumdar, J. Rajendran, and O. Sinanoglu, “SARLock: SAT attack resistant logic locking,” in Proc. IEEE Int. Symp. Hardw. Oriented Security Trust, May 2016, pp. 236–241.
[18]
M. Yasin, A. Sengupta, M. T. Nabeel, M. Ashraf, J. Rajendran, and O. Sinanoglu, “Provably-secure logic locking: From theory to practice,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security, Nov. 2017, pp. 1601–1618.
[19]
M. Liet al., “Provably secure camouflaging strategy for IC protection,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 38, no. 8, pp. 1399–1412, Aug. 2019.
[20]
K. Shamsi, M. Li, T. Meade, Z. Zhao, D. Z. Pan, and Y. Jin, “AppSAT: Approximately deobfuscating integrated circuits,” in Proc. IEEE Int. Symp. Hardw. Oriented Security Trust, May 2017, pp. 95–100.
[21]
Y. Shen and H. Zhou, “Double DIP: Re-evaluating security of logic encryption algorithms,” in Proc. Great Lakes Symp. VLSI, May 2017, pp. 179–184.
[22]
M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran, “Removal attacks on logic locking and camouflaging techniques,” IEEE Trans. Emerg. Topics Comput., to be published.
[23]
D. Sirone and P. Subramanyan, “Functional analysis attacks on logic locking,” in Proc. IEEE Design Autom. Test Europe Conf., Mar. 2019, pp. 936–939.
[24]
Y. Shen, Y. Li, S. Kong, A. Rezaei, and H. Zhou, “SigAttack: New high-level SAT-based attack on logic encryptions,” in Proc. IEEE Design Autom. Test Europe Conf., Mar. 2019, pp. 940–943.
[25]
G. S. Tseytin, “On the complexity of derivations in the propositional calculus,” in Studies in the Mathematics and Mathematical Logic, Part 2. New York, NY, USA: Consultants Bureau, 1968, pp. 115–125.
[26]
J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, “Security analysis of logic obfuscation,” in Proc. ACM/EDAC/IEEE Design Autom. Conf., Jun. 2012, pp. 83–89.
[27]
A. Niemetz, M. Preiner, and A. Biere, “Boolector at the SMT competition 2015,” Inst. Formal Models Verification, Johannes Kepler Univ., Linz, Austria, Rep. 15/1, Jun. 2015.
[28]
K. Shamsi, W. Wen, and Y. Jin, “Hardware security challenges beyond CMOS: Attacks and remedies,” in Proc. IEEE Comput. Soc. Annu. Symp. VLSI, Jul. 2016, pp. 200–205.
[29]
M. Yasin, J. J. V. Rajendran, O. Sinanoglu, and R. Karri, “On improving the security of logic locking,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 35, no. 9, pp. 1411–1424, Sep. 2016.
[30]
J. Cong and Y. Ding, “On area/depth trade-off in LUT-based FPGA technology mapping,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 2, no. 2, pp. 137–148, Jun. 1994.
[31]
S. Dupuis, P.-S. Ba, G. Di Natale, M.-L. Flottes, and B. Rouzeyre, “A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans,” in Proc. IEEE Int. On-Line Test. Symp., Jul. 2014, pp. 49–54.
[32]
C. Yu, X. Zhang, D. Liu, M. Ciesielski, and D. Holcomb, “Incremental SAT-based reverse engineering of camouflaged logic circuits,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 36, no. 10, pp. 1647–1659, Oct. 2017.
[33]
G. Sengar, D. Mukhopadhyay, and D. R. Chowdhury, “Secured flipped scan-chain model for crypto-architecture,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 26, no. 11, pp. 2080–2084, Nov. 2007.
[34]
Y. Atobe, Y. Shi, M. Yanagisawa, and N. Togawa, “Dynamically changeable secure scan architecture against scan-based side channel attack,” in Proc. IEEE Int. SoC Design Conf., Nov. 2012, pp. 155–158.
[35]
R. Karmakar, S. Chattopadhyay, and R. Kapur, “Encrypt flip-flop: A novel logic encryption technique for sequential circuits,” Comput. Res. Repository, vol. abs/1801.04961, pp. 1–14, Aug. 2018.
[36]
J. Lee, M. Tehranipoor, and J. Plusquellic, “A low-cost solution for protecting IPs against scan-based side-channel attacks,” in Proc. IEEE VLSI Test Symp., Apr. 2006, pp. 1–6.
[37]
M. A. Razzaq, V. Singh, and A. Singh, “SSTKR: Secure and testable scan design through test key randomization,” in Proc. IEEE Asian Test Symp., Nov. 2011, pp. 60–65.
[38]
S. Paul, R. S. Chakraborty, and S. Bhunia, “VIm-Scan: A low overhead scan design approach for protection of secret key in scan-based secure chips,” in Proc. IEEE VLSI Test Symp., May 2007, pp. 455–460.
[39]
X. Wang, D. Zhang, M. He, D. Su, and M. Tehranipoor, “Secure scan and test using obfuscation throughout supply chain,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 37, no. 9, pp. 1867–1880, Sep. 2018.
[40]
U. Guin, Z. Zhou, and A. Singh, “Robust design-for-security architecture for enabling trust in IC manufacturing and test,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 26, no. 5, pp. 818–830, May 2018.
[41]
M. E. Massad, S. Garg, and M. Tripunitara, “Reverse engineering camouflaged sequential circuits without scan access,” in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design, Nov. 2017, pp. 33–40.

Cited By

View all
  • (2024)An Overview of FPGA-inspired Obfuscation TechniquesACM Computing Surveys10.1145/367711856:12(1-35)Online publication date: 9-Jul-2024
  • (2023)ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering AttacksACM Transactions on Embedded Computing Systems10.1145/360910722:5s(1-21)Online publication date: 31-Oct-2023
  • (2022)Digitally Assisted Mixed-Signal Circuit SecurityIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2021.311155041:8(2449-2462)Online publication date: 1-Aug-2022

Index Terms

  1. Characterization of In-Cone Logic Locking Resiliency Against the SAT Attack
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
      IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  Volume 39, Issue 8
      Aug. 2020
      200 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 August 2020

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 19 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)An Overview of FPGA-inspired Obfuscation TechniquesACM Computing Surveys10.1145/367711856:12(1-35)Online publication date: 9-Jul-2024
      • (2023)ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering AttacksACM Transactions on Embedded Computing Systems10.1145/360910722:5s(1-21)Online publication date: 31-Oct-2023
      • (2022)Digitally Assisted Mixed-Signal Circuit SecurityIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2021.311155041:8(2449-2462)Online publication date: 1-Aug-2022
      • (2021)PhaseCamouflage: Leveraging Adiabatic Operation to Thwart Reverse EngineeringIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2021.307856729:7(1285-1296)Online publication date: 1-Jul-2021

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media