VIGILANT: Vulnerability Detection Tool Against Fault-Injection Attacks for Locking Techniques

被引:1
|
作者
Mankali, Likhitha [1 ]
Patnaik, Satwik [2 ]
Limaye, Nimisha [1 ,3 ]
Knechtel, Johann [4 ]
Sinanoglu, Ozgur [4 ]
机构
[1] NYU, Tandon Sch Engn, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
[2] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
[3] Synopsys Inc, Solut Grp, Mountain View, CA 94043 USA
[4] New York Univ Abu Dhabi, Div Engn, Abu Dhabi 129188, U Arab Emirates
关键词
Fault-injection; logic locking; physical attacks; LOGIC LOCKING; SECURITY;
D O I
10.1109/TCAD.2023.3259300
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Logic locking is a well-known solution that thwarts design intellectual property (IP) piracy and prevents illegal overproduction of integrated circuits (ICs) against adversaries in the globalized supply chain. The widespread prevalence of reverse-engineering tools, probing, and fault-injection equipment has given rise to physical attacks that can undermine the security of a locked design. Fault-injection attacks, in particular, can extract the secret key from an oracle, circumventing the defense offered by logic locking. When design IP is compromised through physical attacks, fixing corresponding vulnerabilities generally require a silicon respin, which is impractical under constrained time and resources. Thus, there is a requirement for a detection tool that can perform a presilicon evaluation of locked designs to notify the designer of any vulnerabilities that can be exploited using faults. In this work, we propose VIGILANT, a first-of-its-kind vulnerability detection tool against fault-injection attacks targeting the hardware implementation of locking techniques. More specifically, VIGILANT aids designers in identifying critical nets susceptible to fault-injection attacks. VIGILANT analyzes the underlying locked design and computes a list of candidate nets along with their fault values required for key leakage and consequently validates each candidate net as vulnerable or not, using a functional simulation model of the design (acting as an oracle). We showcase the efficacy of VIGILANT on different locked designs for four different locking techniques under various parameters, such as technology nodes, layout-generation commands, and key-sizes. The accuracy of VIGILANT in identifying and validating all the candidate nets that are vulnerable to fault-injection attacks is 100%.
引用
收藏
页码:3571 / 3584
页数:14
相关论文
共 50 条
  • [1] SoFI: Security Property-Driven Vulnerability Assessments of ICs Against Fault-Injection Attacks
    Wang, Huanyu
    Li, Henian
    Rahman, Fahim
    Tehranipoor, Mark M.
    Farahmandi, Farimah
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (03) : 452 - 465
  • [2] Examining Thread Vulnerability Analysis Using Fault-Injection
    Oz, Isil
    Topcuoglu, Haluk Rahmi
    Kandemir, Mahmut
    Tosun, Oguz
    2013 IFIP/IEEE 21ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2013, : 240 - 245
  • [3] Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
    Kumar, Raghavan
    Jovanovic, Philipp
    Burleson, Wayne
    Polian, Ilia
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 18 - 28
  • [4] Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
    Rauzy, Pablo
    Guilley, Sylvain
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 68 - 82
  • [5] HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks
    Javaheripi, Mojan
    Koushanfar, Farinaz
    2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD), 2021,
  • [6] FlightGear as a tool for real time fault-injection, detection and self-repair
    Purvis, Alan
    Morris, Ben
    McWilliam, Richard
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON THROUGH-LIFE ENGINEERING SERVICES, 2015, 38 : 283 - 288
  • [7] Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard
    Karpovsky, M
    Kulikowski, KJ
    Taubin, A
    2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 93 - 101
  • [8] ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
    Schneider, Tobias
    Moradi, Amir
    Gueneysu, Tim
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 39 - 39
  • [9] ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
    Schneider, Tobias
    Moradi, Amir
    Gueneysu, Tim
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 302 - 332
  • [10] A netlist-level fault-injection tool for FPGAs
    Fibich, C.
    Roessler, P.
    Tauner, S.
    Taucher, H.
    Matschnig, M.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (06): : 274 - 281