Trace Logic Locking: Improving the Parametric Space of Logic Locking

被引:11
|
作者
Zuzak, Michael [1 ]
Liu, Yuntao [1 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
Intellectual property (IP) piracy; logic locking; reverse engineering; SAT attack; trace logic locking (TLL); SECURITY; PIRACY;
D O I
10.1109/TCAD.2020.3025135
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To protect against an untrusted foundry, logic locking must 1) inject sufficient error to ensure critical application failures for any wrong key (error severity) and 2) resist any attack against it (attack resilient). We begin our work by deriving a fundamental tradeoff between these two goals which exists underlying all logic locking, regardless of construction. This relationship forces integrated circuit (IC) designers to sacrifice the error severity of logic locking to increase its attack resilience and vice versa. We proceed by exploring the consequences of this tradeoff through architectural simulations of ICs incorporating locking sweeping over the derived parametric space. We find that the efficacy of logic locking is severely limited by this tradeoff. In response, we propose trace logic locking (TLL), a novel enhancement of module level logic locking which enables existing art to secure arbitrary length sequences of input minterms, referred to as traces. Doing so injects an additional degree of freedom into the parametric space of locking, enabling locking techniques to overcome the limitations of our derived tradeoff. We both theoretically and empirically prove this by using TLL to enhance cutting edge locking. In ten large benchmarks, we show that TLL-enhanced logic locking provides exponentially stronger attack resilience than conventional locking with only modest additional overhead. Finally, we demonstrate the efficacy of TLL in a processor IC using architectural simulations. Despite prior art being unable to secure this IC, we find that TLL concurrently achieves strong error severity and attack resilience.
引用
收藏
页码:1531 / 1544
页数:14
相关论文
共 50 条
  • [21] Design and Analysis of Logic Locking Techniques
    Saha, Akashdeep
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 194 - 195
  • [22] Attacks on Logic Locking Obfuscation Techniques
    Mellor, Jake
    Shelton, Allen
    Yue, Michael
    Tehranipoor, Fatemeh
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [23] Latch-Based Logic Locking
    Sweeney, Joseph
    Zackriya, Mohammed, V
    Pagliarini, Samuel
    Pileggi, Lawrence
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 132 - 141
  • [24] Lockit: A Logic Locking Automation Software
    Kajtez, Nemanja
    Zhang, Yue
    Halak, Basel
    ELECTRONICS, 2021, 10 (22)
  • [25] Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction
    Xie, Yang
    Srivastava, Ankur
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [26] Logic Locking in Single Flux Quantum Circuit
    Jabbari, Tahereh
    Krylov, Gleb
    Friedman, Eby G.
    IEEE TRANSACTIONS ON APPLIED SUPERCONDUCTIVITY, 2021, 31 (05)
  • [27] Shielding Logic Locking from Redundancy Attacks
    Li, Leon
    Orailoglu, Alex
    2019 IEEE 37TH VLSI TEST SYMPOSIUM (VTS), 2019,
  • [28] Hardware Obfuscation and Logic Locking: A Tutorial Introduction
    Hoque, Tamzidul
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    IEEE DESIGN & TEST, 2020, 37 (03) : 59 - 77
  • [29] Does logic locking work with EDA tools?
    Han, Zhaokun
    Yasin, Muhammad
    Rajendran, Jeyavijayan
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1055 - 1072
  • [30] Classical Cryptanalysis Attacks on Logic Locking Techniques
    Bodhisatwa Mazumdar
    Soma Saha
    Ghanshyam Bairwa
    Souvik Mandal
    Tatavarthy Venkat Nikhil
    Journal of Electronic Testing, 2019, 35 : 641 - 654