A critical view on the real-world security of logic locking

被引:4
|
作者
Engels, Susanne [1 ,2 ]
Hoffmann, Max [1 ]
Paar, Christof [2 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Max Planck Inst Secur & Privacy, Bochum, Germany
关键词
ENDING PIRACY; THREAT;
D O I
10.1007/s13389-022-00294-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is logic locking, where the genuine functionality of a chip is "locked" using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction-a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction.
引用
收藏
页码:229 / 244
页数:16
相关论文
共 50 条
  • [31] Real-world trials to answer real-world questions
    Freemantle, N
    Blonde, L
    Bolinder, B
    Gerber, RA
    Hobbs, FDR
    Martinez, L
    Ross, S
    PHARMACOECONOMICS, 2005, 23 (08) : 747 - 754
  • [32] Translating real-world evidence/real-world data
    Ravenstijn, Paulien
    CTS-CLINICAL AND TRANSLATIONAL SCIENCE, 2024, 17 (05):
  • [33] Real-world trials to answer real-world questions
    Nick Freemantle
    Lawrence Blonde
    Bjorn Bolinder
    Robert A. Gerber
    F. D. Richard Hobbs
    Luc Martinez
    Stuart Ross
    PharmacoEconomics, 2005, 23 : 747 - 754
  • [34] Real-world studies addressing real-world issues
    Freemantle, N
    DEUTSCHE MEDIZINISCHE WOCHENSCHRIFT, 2005, 130 : S77 - S81
  • [35] Balancing real-world problems with real-world results
    Gordon, R
    PHI DELTA KAPPAN, 1998, 79 (05) : 390 - 393
  • [36] Logic locking emulator on FPGA: A conceptual view
    Chellam, Manjith Baby Sarojam
    Natarajan, Ramasubramanian
    Naganathan, Nagi
    PROCEEDINGS OF THE 37TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, VLSID 2024 AND 23RD INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, ES 2024, 2024, : 553 - 559
  • [37] A Novel Logic Locking Technique for Hardware Security
    Thangam, T.
    Gayathri, G.
    Madhubala, T.
    2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, INSTRUMENTATION AND COMMUNICATION ENGINEERING (ICEICE), 2017,
  • [38] Importance of Logic Locking Attacks in Hardware Security
    Ashika, S.V.
    Sivamangai, N.M.
    Naveenkumar, R.
    Napolean, A.
    IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings, 2023, : 156 - 160
  • [39] COMBINING LOGIC AND DIFFERENTIAL-EQUATIONS FOR DESCRIBING REAL-WORLD SYSTEMS
    SANDEWALL, E
    PROCEEDINGS OF THE FIRST CONFERENCE ON PRINCIPLES OF KNOWLEDGE REPRESENTATION AND REASONING, 1989, : 412 - 420
  • [40] THE REAL-WORLD
    GRAY, M
    NEW REPUBLIC, 1995, 212 (25) : 4 - 4