A Comprehensive Test Pattern Generation Approach Exploiting the SAT Attack for Logic Locking

被引:0
|
作者
Zhong, Yadi [1 ]
Guin, Ujjwal [1 ]
机构
[1] Auburn Univ, Dept Elect & Comp Engn, Auburn, AL 36849 USA
基金
美国国家科学基金会;
关键词
ATPG; D-Algorithm; Boolean satisfiability; logic locking; fault coverage; PIRACY; ACCELERATION; ALGORITHM;
D O I
10.1109/TC.2023.3248268
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The need for reducing manufacturing defect escape in today's safety-critical applications requires increased fault coverage. However, generating a test set using commercial automatic test pattern generation (ATPG) tools that lead to zero-defect escape is still an open problem. It is challenging to detect all stuck-at faults to reach 100% fault coverage. In parallel, the hardware security community has been actively involved in developing solutions for logic locking to prevent IP piracy. In logic locking, locks are inserted in different locations of the netlist to modify the original functionality. Unless the correct key is programmed into the IC, the circuit functions incorrectly. Unfortunately, the Boolean satisfiability (SAT) based attack, introduced in (Subramanyan et al. 2015), can determine the secret key efficiently, and break different logic locking schemes. In this article, we propose a novel test pattern generation approach using the powerful SAT attack on logic locking. A stuck-at fault is modeled as a locked gate with a secret key, where it can effectively deduce the satisfiable assignment with reduced backtracks under key initialization of the SAT attack. The input pattern that determines the key is a test for the stuck-at fault. We propose two different approaches for test pattern generation. First, a single stuck-at fault is targeted, and a corresponding locked circuit with one key bit is created. This approach generates one test pattern per fault. Second, we consider a group of faults and convert the circuit to its locked version with multiple key bits. The inputs obtained from the SAT attack tool are the test set for detecting this group of faults. Our approach can find test patterns for all hard-to-detect faults that were previously undetected in commercial ATPG tools. The proposed test pattern generation approach can efficiently detect redundant faults as well. We demonstrate the effectiveness of the approach on ITC'99 benchmarks. The results show that we can detect all the hard-to-detect faults and identify redundant faults and a 100% stuck fault coverage is achieved. In addition, we show that test generation time saving becomes significant for Approach 2 as multiple faults help reduce or remove conflicts.
引用
收藏
页码:2293 / 2305
页数:13
相关论文
共 50 条
  • [1] Mitigating SAT Attack on Logic Locking
    Xie, Yang
    Srivastava, Ankur
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 127 - 146
  • [2] Anti-SAT: Mitigating SAT Attack on Logic Locking
    Xie, Yang
    Srivastava, Ankur
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (02) : 199 - 207
  • [3] Complexity Analysis of the SAT Attack on Logic Locking
    Zhong, Yadi
    Guin, Ujjwal
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (10) : 3143 - 3156
  • [4] SARLock: SAT Attack Resistant Logic Locking
    Yasin, Muhammad
    Mazumdar, Bodhisatwa
    Rajendran, Jeyavijayan
    Sinanoglu, Ozgur
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 236 - 241
  • [5] Generalized SAT-Attack-Resistant Logic Locking
    Zhou, Jingbo
    Zhang, Xinmiao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2581 - 2592
  • [6] SAT Based Partial Attack on Compound Logic Locking
    John, Melbin
    Hoda, Aadil
    Chouksey, Ramanuj
    Karfa, Chandan
    [J]. PROCEEDINGS OF THE 2020 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2020,
  • [7] Increasing the SAT Attack Resiliency of In-Cone Logic Locking
    Juretus, Kyle
    Savidis, Ioannis
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [8] Increased Output Corruption and Structural Attack Resilience for SAT Attack Secure Logic Locking
    Juretus, Kyle
    Savidis, Ioannis
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (01) : 38 - 51
  • [9] Functional Reverse Engineering on SAT-Attack Resilient Logic Locking
    Alrahis, Lilas
    Yasin, Muhammad
    Saleh, Hani
    Mohammad, Baker
    Al-Qutayri, Mahmoud
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [10] Characterization of In-Cone Logic Locking Resiliency Against the SAT Attack
    Juretus, Kyle
    Savidis, Ioannis
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (08) : 1607 - 1620