论文标题

一种新颖的拓扑引导攻击及其对安全逻辑锁定的对策

A Novel Topology-Guided Attack and Its Countermeasure Towards Secure Logic Locking

论文作者

Zhang, Yuqiao, Jain, Ayush, Cui, Pinchen, Zhou, Ziqi, Guin, Ujjwal

论文摘要

由于存在不受信任的实体,诸如ICS过度生产,出售特定的/被拒绝的ICS和知识特性(IPS)(IPS)(IPS),在当前水平半导体集成流中的设计和制造(ICS)构成了各种安全威胁。因此,逻辑锁定成为信任技术的突出设计之一。不幸的是,这些锁定技术现在倾向于在[47]中发表的开创性工作后实现完全布尔的满意度(SAT)弹性。在本文中,我们提出了一种新颖的无甲骨文攻击,该攻击基于对锁定网表的拓扑分析,即使它具有弹性。该攻击依赖于识别和构建单元功能,并在整个NetList中搜索的假设密钥以找到其副本。提出的图形搜索算法有效地找到了网络列表中的重复功能,使其成为自我引用的攻击。该提议的攻击非常有效,可以在几分钟内确定秘密钥匙。我们还提出了一种对策,以使电路对这种拓扑引导的攻击进行弹性,以朝着安全的逻辑锁定技术迈进。

The outsourcing of the design and manufacturing of integrated circuits (ICs) in the current horizontal semiconductor integration flow has posed various security threats due to the presence of untrusted entities, such as overproduction of ICs, sale of out-of-specification/rejected ICs, and piracy of Intellectual Properties (IPs). Consequently, logic locking emerged as one of the prominent design for trust techniques. Unfortunately, these locking techniques are now inclined to achieve complete Boolean satisfiability (SAT) resiliency after the seminal work published in [47]. In this paper, we propose a novel oracle-less attack that is based on the topological analysis of the locked netlist even though it is SAT-resilient. The attack relies on identifying and constructing unit functions with a hypothesis key to be searched in the entire netlist to find its replica. The proposed graph search algorithm efficiently finds the duplicate functions in the netlist, making it a self-referencing attack. This proposed attack is extremely efficient and can determine the secret key within a few minutes. We have also proposed a countermeasure to make the circuit resilient against this topology-guided attack to progress towards a secure logic locking technique.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源