On the Security of Sequential Logic Locking Against Oracle-Guided Attacks

被引:4
|
作者
Hu, Yinghua [1 ,2 ]
Zhang, Yuke [1 ]
Yang, Kaixin [1 ]
Chen, Dake [1 ]
Beerel, Peter A. [1 ]
Nuzzo, Pierluigi [1 ]
机构
[1] Univ Southern Calif, Ming Hsieh Dept Elect & Comp Engn, Los Angeles, CA 90089 USA
[2] Synopsys Inc, Elect Design Automat Grp, Mountain View, CA 94043 USA
关键词
Sequential circuits; Model checking; Cryptography; Clocks; Time factors; Integrated circuit modeling; Electronics packaging; Hardware security; logic locking; model checking; satisfiability (SAT)-based attack; OBFUSCATION;
D O I
10.1109/TCAD.2023.3253428
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most combinational logic locking schemes by efficiently pruning out all the wrong keys from the search space. Extending such an attack to sequential logic locking requires multiple time-consuming rounds of SAT solving, performed using an "unrolled" version of the sequential circuit, and model checking, used to determine the successful termination of the attack. This article addresses these challenges by formally characterizing the relation between the minimum unrolling depth required to prune out the wrong keys of an SAT-based attack and a notion of functional corruptibility (FC) for sequential circuits, which can be efficiently estimated from a locked circuit to indicate the progress of an SAT-based attack. Based on this analysis, we present an FC-guided SAT-based attack that can significantly reduce unnecessary SAT and model-checking tasks. We present two versions of the attack, namely, Fun-SAT and Fun-SAT+, based on whether the attacker has a priori knowledge of the key length. Fun-SAT aims to find the correct key sequence, while Fun-SAT+ aims to retrieve the correct initial state of the circuit. The numerical evaluation shows that Fun-SAT can be, on average, 90x faster than previous attacks against state-of-the-art locking methods. On the other hand, when using an approximate termination condition, Fun-SAT+ can find an initial state that leads to at most 0.1% FC in 76.9% instances that would otherwise time out after one day.
引用
收藏
页码:3628 / 3641
页数:14
相关论文
共 50 条
  • [1] DK Lock: Dual Key Logic Locking Against Oracle-Guided Attacks
    Maynard, Jordan
    Rezaei, Amin
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 252 - 258
  • [2] Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks
    Limaye, Nimisha
    Chowdhury, Animesh B.
    Pilato, Christian
    Nabeel, Mohammed T. M.
    Sinanoglu, Ozgur
    Garg, Siddharth
    Karri, Ramesh
    2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2021, : 91 - 96
  • [3] Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks
    Rahman, M. Sazadur
    Nahiyan, Adib
    Rahman, Fahim
    Fazzari, Saverio
    Plaks, Kenneth
    Farahmandi, Farimah
    Forte, Domenic
    Tehranipoor, Mark
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2021, 26 (04)
  • [4] TaintLock: Hardware IP Protection Against Oracle-Guided and Oracle-Reconstruction Attacks
    Talukdar, Jonti
    Chaudhuri, Arjun
    Ortega, Eduardo
    Chakrabarty, Krishnendu
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2025, 44 (01) : 357 - 370
  • [5] Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail?
    Shamsi, Kaveh
    Li, Meng
    Meade, Travis
    Zhao, Zheng
    Pan, David Z.
    Jin, Yier
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 357 - 362
  • [6] A BIST-based Dynamic Obfuscation Scheme for Resilience against Removal and Oracle-guided Attacks
    Talukdar, Jonti
    Chen, Siyuan
    Das, Amitabh
    Aftabjahani, Sohrab
    Song, Peilin
    Chakrabarty, Krishnendu
    2021 IEEE INTERNATIONAL TEST CONFERENCE (ITC 2021), 2021, : 170 - 179
  • [7] Logic Locking With Provable Security Against Power Analysis Attacks
    Sengupta, Abhrajit
    Mazumdar, Bodhisatwa
    Yasin, Muhammad
    Sinanoglu, Ozgur
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (04) : 766 - 778
  • [8] Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking
    Limaye, Nimisha
    Kalligeros, Emmanouil
    Karousos, Nikolaos
    Karybali, Irene G.
    Sinanoglu, Ozgur
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (09) : 1740 - 1753
  • [9] Oracle-Guided Incremental SAT Solving to Reverse Engineer Camouflaged Logic Circuits
    Liu, Duo
    Yu, Cunxi
    Zhang, Xiangyu
    Holcomb, Daniel
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 433 - 438
  • [10] Oracle-based Logic Locking Attacks: Protect the Oracle Not Only the Netlist
    Kalligeros, Emmanouil
    Karousos, Nikolaos
    Karybali, Irene G.
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 939 - 944