A critical view on the real-world security of logic locking

被引:4
|
作者
Engels, Susanne [1 ,2 ]
Hoffmann, Max [1 ]
Paar, Christof [2 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Max Planck Inst Secur & Privacy, Bochum, Germany
关键词
ENDING PIRACY; THREAT;
D O I
10.1007/s13389-022-00294-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is logic locking, where the genuine functionality of a chip is "locked" using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction-a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction.
引用
收藏
页码:229 / 244
页数:16
相关论文
共 50 条
  • [1] A critical view on the real-world security of logic locking
    Susanne Engels
    Max Hoffmann
    Christof Paar
    Journal of Cryptographic Engineering, 2022, 12 : 229 - 244
  • [2] Real-World Security Protocols
    Hao, Feng
    IEEE SECURITY & PRIVACY, 2024, 22 (06) : 9 - 10
  • [4] Real-world learning with Markov logic networks
    Domingos, P
    KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2004, PROCEEDINGS, 2004, 3202 : 17 - 17
  • [5] Real-world learning with Markov logic networks
    Domingos, Pedro
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3202
  • [6] Real-world learning with Markov logic networks
    Domingos, P
    MACHINE LEARNING: ECML 2004, PROCEEDINGS, 2004, 3201 : 17 - 17
  • [7] On Improving the Security of Logic Locking
    Yasin, Muhammad
    Rajendran, Jeyavijayan
    Sinanoglu, Ozgur
    Karri, Ramesh
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (09) : 1411 - 1424
  • [8] Real-World VANET Security Protocol Performance
    Haas, Jason J.
    Hu, Yih-Chun
    Laberteaux, Kenneth P.
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2629 - +
  • [9] Security Applications: Lessons of Real-World Deployment
    Pita, James
    Bellamane, Harish
    Jain, Manish
    Kiekintveld, Chris
    Tsai, Jason
    Ordonez, Fernando
    Tambe, Milind
    ACM SIGECOM EXCHANGES, 2009, 8 (02)
  • [10] Analyzing the Real-World Security of the Algorand Blockchain
    Blum, Erica
    Leung, Derek
    Loss, Julian
    Katz, Jonathan
    Rabin, Tal
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 830 - 844