Piercing Logic Locking Keys through Redundancy Identification

2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)(2019)

引用 59|浏览14
暂无评分
摘要
The globalization of the IC supply chain witnesses the emergence of hardware attacks such as reverse engineering, hardware Trojans, IP piracy and counterfeiting. The consequent losses sum to billions of dollars for the IC industry. One way to defend against these threats is to lock the circuit by inserting additional key-controlled logic such that correct outputs are produced only when the correct key is applied. The viability of logic locking techniques in precluding IP piracy has been tested by researchers who have identified extensive weaknesses when access to a functional IC is guaranteed.In this paper, we uncover weaknesses of logic locking techniques when the attacker has no access to an activated IC, thus exposing vulnerabilities at the earliest stage even for applications that seek refuge from attacks through functional opaqueness. We develop an attack algorithm that prunes out the incorrect value of each key bit when it introduces a significant level of logic redundancy. Throughout our experiments on ISCAS-85 and ISCAS-89 benchmark circuits, the attack deciphers more than half of the key bits on average with a high accuracy.
更多
查看译文
关键词
IC industry,functional IC,logic locking techniques,logic redundancy,ISCAS-89 benchmark circuits,redundancy identification,globalization,hardware attacks,IC supply chain,logic locking key piercing,ISCAS-85 benchmark circuits,key-controlled logic
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要