Thwarting GNN-Based Attacks Against Logic Locking

被引:0
|
作者
Darjani, Armin [1 ]
Kavand, Nima [1 ]
Rai, Shubham [2 ]
Kumar, Akash [3 ]
机构
[1] Tech Univ Dresden, Dept Comp Sci, D-01062 Dresden, Germany
[2] Robert Bosch GmbH, Corp Res, D-71272 Renningen, Germany
[3] Ruhr Univ Bochum, Fac Elect Engn & Informat Technol, D-44801 Bochum, Germany
关键词
Logic locking; structural attacks; GNN-based attacks; learning-resilient; SECURITY;
D O I
10.1109/TIFS.2024.3431991
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The globalization of the IC manufacturing flow has exposed intellectual property (IP) to many untrustworthy entities. As a result, security should be considered a new paradigm in designing circuits to protect the integrity and confidentiality of the IP. Logic locking is a holistic design-for-trust (DFT) technique that can protect circuits against IP piracy and reverse engineering. However, a large body of recent research has demonstrated successful methods of recovering the secret key and restoring the original functionality of existing locking systems. Although SAT attack has been a de facto technique to break the logic locking, the threat model and efficiency of this attack have been questioned recently. To overcome these shortcomings, researchers have proposed powerful structural attacks that break the locked circuits without the need for functionally unlocked circuits (Oracle). Among structural attacks, machine learning (ML)-based attacks are the most potent attacks as they harness the power of neural networks to learn traces of the locking structures and use this knowledge to reverse back and neutralize the locking scheme. Among ML approaches, GNN (graph neural networks)-based attacks are shown to be the most capable tools that attackers can employ as they exploit graph structures inherent to a circuit's netlist. In this paper, (1) We discuss the inherent structural weaknesses of the logic locking techniques. (2) Knowing these weaknesses, we investigate the challenges of protecting circuits against GNN-based attacks. (3) We propose GNN-resilient Interconnect-based obfuscation (GRIN) and GNN-resilient Gate-based Obfuscation (GREGO) logic locking schemes with learning resilient structures. We evaluate our secure schemes using ISCAS-85 and ITC-99 benchmarks and provide comprehensive security and overhead analysis of our proposed schemes.
引用
收藏
页码:7200 / 7215
页数:16
相关论文
共 50 条
  • [1] Discerning Limitations of GNN-based Attacks on Logic Locking
    Darjani, Armin
    Kavand, Nima
    Rai, Shubham
    Kumar, Akash
    [J]. 2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [2] Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking
    Limaye, Nimisha
    Kalligeros, Emmanouil
    Karousos, Nikolaos
    Karybali, Irene G.
    Sinanoglu, Ozgur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (09) : 1740 - 1753
  • [3] Targeted Shilling Attacks on GNN-based Recommender Systems
    Guo, Sihan
    Bai, Ting
    Deng, Weihong
    [J]. PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 649 - 658
  • [4] Resynthesis-based Attacks Against Logic Locking
    Almeida, Felipe
    Aksoy, Levent
    Nguyen, Quang-Linh
    Dupuis, Sophie
    Flottes, Marie-Lise
    Pagliarini, Samuel
    [J]. 2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 547 - 554
  • [5] GNN-Based Network Traffic Analysis for the Detection of Sequential Attacks in IoT
    Altaf, Tanzeela
    Wang, Xu
    Ni, Wei
    Yu, Guangsheng
    Liu, Ren Ping
    Braun, Robin
    [J]. ELECTRONICS, 2024, 13 (12)
  • [6] ENTANGLE: An Enhanced Logic-locking Technique for Thwarting SAT and Structural Attacks
    Darjani, Armin
    Kavand, Nima
    Rai, Shubham
    Wijtvliet, Mark
    Kumar, Akash
    [J]. PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 147 - 151
  • [7] UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking
    Alrahis, Lilas
    Patnaik, Satwik
    Knechtel, Johann
    Saleh, Hani
    Mohammad, Baker
    Al-Qutayri, Mahmoud
    Sinanoglu, Ozgur
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2508 - 2523
  • [8] Poisoning GNN-based Recommender Systems with Generative Surrogate-based Attacks
    Thanh, Toan Nguyen
    Quach, Nguyen Duc Khang
    Nguyen, Thanh Tam
    Huynh, Thanh Trung
    Vu, Viet Hung
    Le Nguyen, Phi
    Jo, Jun
    Nguyen, Quoc Viet Hung
    [J]. ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 41 (03)
  • [9] GNN-based passenger request prediction
    Makhdomi, Aqsa Ashraf
    Gillani, Iqra Altaf
    [J]. TRANSPORTATION LETTERS-THE INTERNATIONAL JOURNAL OF TRANSPORTATION RESEARCH, 2023, 16 (10): : 1237 - 1251
  • [10] A2S2-GNN: Rigging GNN-Based Social Status by Adversarial Attacks in Signed Social Networks
    Yin, Xiaoyan
    Lin, Wanyu
    Sun, Kexin
    Wei, Chun
    Chen, Yanjiao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 206 - 220