VIGILANT: Vulnerability Detection Tool Against Fault-Injection Attacks for Locking Techniques

被引:1
|
作者
Mankali, Likhitha [1 ]
Patnaik, Satwik [2 ]
Limaye, Nimisha [1 ,3 ]
Knechtel, Johann [4 ]
Sinanoglu, Ozgur [4 ]
机构
[1] NYU, Tandon Sch Engn, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
[2] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
[3] Synopsys Inc, Solut Grp, Mountain View, CA 94043 USA
[4] New York Univ Abu Dhabi, Div Engn, Abu Dhabi 129188, U Arab Emirates
关键词
Fault-injection; logic locking; physical attacks; LOGIC LOCKING; SECURITY;
D O I
10.1109/TCAD.2023.3259300
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Logic locking is a well-known solution that thwarts design intellectual property (IP) piracy and prevents illegal overproduction of integrated circuits (ICs) against adversaries in the globalized supply chain. The widespread prevalence of reverse-engineering tools, probing, and fault-injection equipment has given rise to physical attacks that can undermine the security of a locked design. Fault-injection attacks, in particular, can extract the secret key from an oracle, circumventing the defense offered by logic locking. When design IP is compromised through physical attacks, fixing corresponding vulnerabilities generally require a silicon respin, which is impractical under constrained time and resources. Thus, there is a requirement for a detection tool that can perform a presilicon evaluation of locked designs to notify the designer of any vulnerabilities that can be exploited using faults. In this work, we propose VIGILANT, a first-of-its-kind vulnerability detection tool against fault-injection attacks targeting the hardware implementation of locking techniques. More specifically, VIGILANT aids designers in identifying critical nets susceptible to fault-injection attacks. VIGILANT analyzes the underlying locked design and computes a list of candidate nets along with their fault values required for key leakage and consequently validates each candidate net as vulnerable or not, using a functional simulation model of the design (acting as an oracle). We showcase the efficacy of VIGILANT on different locked designs for four different locking techniques under various parameters, such as technology nodes, layout-generation commands, and key-sizes. The accuracy of VIGILANT in identifying and validating all the candidate nets that are vulnerable to fault-injection attacks is 100%.
引用
收藏
页码:3571 / 3584
页数:14
相关论文
共 50 条
  • [21] Secure Systolic Montgomery Modular Multiplier Resilient to Hardware Trojan and Fault-Injection Attacks
    Yang, Qi
    Qin, Zhongping
    2013 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2013,
  • [22] NetLoiter: A Tool for Automated Testing of Network Applications using Fault-injection
    Rozsival, Michal
    Smrcka, Ales
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS, DSN-W, 2023, : 207 - 210
  • [23] First Results of Automatic Fault-Injection in an AUTOSAR Tool-chain
    Baumgarten, Guilherme
    Oertel, Markus
    Rettberg, Achim
    Goetz, Marcelo
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2014, : 170 - +
  • [24] Securing Network-on-chips Against Fault-injection and Crypto-analysis Attacks via Stochastic Anonymous Routing
    Patooghy, Ahmad
    Hasanzadeh, Mahdi
    Sarihi, Amin
    Abdelrehim, Mostafa
    Badawy, Abdel-Hameed A.
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (03)
  • [25] ATPG-Guided Fault Injection Attacks on Logic Locking
    Jain, Ayush
    Rahman, M. Tanjidur
    Guin, Ujjwal
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL CONFERENCE ON PHYSICAL ASSURANCE AND INSPECTION ON ELECTRONICS (PAINE), 2020,
  • [26] Secure Multipliers Resilient to Strong Fault-Injection Attacks Using Multilinear Arithmetic Codes
    Wang, Zhen
    Karpovsky, Mark
    Joshi, Ajay
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (06) : 1036 - 1048
  • [27] Fault Attacks, Injection Techniques and Tools for Simulation
    Piscitelli, Roberta
    Bhasin, Shivam
    Regazzoni, Francesco
    2015 10TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS), 2015,
  • [28] The State of Fault Injection Vulnerability Detection
    Given-Wilson, Thomas
    Jafri, Nisrine
    Legay, Axel
    VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, 2018, 11181 : 3 - 21
  • [29] An Automated SEU Fault-Injection Method and Tool for HDL-Based Designs
    Mansour, Wassim
    Velazco, Raoul
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2013, 60 (04) : 2728 - 2733
  • [30] Secure Systolic Montgomery Modular Multiplier Over Prime Fields Resilient to Fault-Injection Attacks
    Yang, Qi
    Hu, Xiaoting
    Qin, Zhongping
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2015, 23 (09) : 1889 - 1902