A critical view on the real-world security of logic locking

被引:4
|
作者
Engels, Susanne [1 ,2 ]
Hoffmann, Max [1 ]
Paar, Christof [2 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Max Planck Inst Secur & Privacy, Bochum, Germany
关键词
ENDING PIRACY; THREAT;
D O I
10.1007/s13389-022-00294-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is logic locking, where the genuine functionality of a chip is "locked" using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction-a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction.
引用
收藏
页码:229 / 244
页数:16
相关论文
共 50 条
  • [11] The Real-World Dilemma of Security and Privacy by Design
    Sadeghisecurity, Ahmad-Reza
    COMMUNICATIONS OF THE ACM, 2021, 64 (10) : 84 - 84
  • [12] View-based recognition of real-world textures
    Pietikäinen, M
    Nurmela, T
    Mäenpää, T
    Turtinen, M
    PATTERN RECOGNITION, 2004, 37 (02) : 313 - 323
  • [13] Provides convenience and security that transcend real-world shopping
    Saito, T
    Hase, M
    Hatanaka, M
    Sonehara, N
    NTT REVIEW, 2001, 13 (04): : 14 - 19
  • [14] Security Testing and Compliance for Online Banking in Real-World
    Chen, Hao
    Corriveau, Jean-Pierre
    IMECS 2009: INTERNATIONAL MULTI-CONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2009, : 1039 - 1043
  • [15] Real-world complexity of food security and biodiversity conservation
    Habel, Jan Christian
    Teucher, Mike
    Hornetz, Berthold
    Jaetzold, Ralph
    Kimatu, Josphert N.
    Kasili, Sichangi
    Mairura, Zachariah
    Mulwa, Ronald K.
    Eggermont, Hilde
    Weisser, Wolfgang W.
    Lens, Luc
    BIODIVERSITY AND CONSERVATION, 2015, 24 (06) : 1531 - 1539
  • [16] Automated Security Analysis for Real-World IoT Devices
    Brun, Lelio
    Hasuo, Ichiro
    Ono, Yasushi
    Sekiyama, Taro
    PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 29 - 37
  • [17] Real-world complexity of food security and biodiversity conservation
    Jan Christian Habel
    Mike Teucher
    Berthold Hornetz
    Ralph Jaetzold
    Josphert N. Kimatu
    Sichangi Kasili
    Zachariah Mairura
    Ronald K. Mulwa
    Hilde Eggermont
    Wolfgang W. Weisser
    Luc Lens
    Biodiversity and Conservation, 2015, 24 : 1531 - 1539
  • [18] Keynote: Privacy and Security in Real-World Data Annotation
    Tonkin, Emma L.
    2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [19] The efficacy of commutativity-based semantic locking in a real-world application
    Wu, Paul
    Fekete, Alan
    Rohm, Uwe
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (03) : 427 - 431
  • [20] Real-world study: from real-world data to real-world evidence
    Wen, Yi
    TRANSLATIONAL BREAST CANCER RESEARCH, 2020, 1