A Combined Logical and Physical Attack on Logic Obfuscation

被引:1
|
作者
Zuzak, Michael [1 ]
Liu, Yuntao [2 ]
McDaniel, Isaac [2 ]
Srivastava, Ankur [2 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
[2] Univ Maryland, College Pk, MD USA
关键词
Untrusted Foundry; CLAP Attack; Logic Obfuscation; EOFM Probe; LOCKING; FUNCTIONALITY; BENCHMARKS; SECURITY; MAXSAT;
D O I
10.1145/3508352.3549349
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Logic obfuscation protects integrated circuits from an untrusted foundry attacker during manufacturing. To counter obfuscation, a number of logical (e.g. Boolean satisfiability) and physical (e.g. electro-optical probing) attacks have been proposed. By definition, these attacks use only a subset of the information leaked by a circuit to unlock it. Countermeasures often exploit the resulting blind-spots to thwart these attacks, limiting their scalability and generalizability. To overcome this, we propose a combined logical and physical attack against obfuscation called the CLAP attack. The CLAP attack leverages both the logical and physical properties of a locked circuit to prune the keyspace in a unified and theoreticallyrigorous fashion, resulting in a more versatile and potent attack. To formulate the physical portion of the CLAP attack, we derive a logical formulation that provably identifies input sequences capable of sensitizing logically expressive regions in a circuit. We prove that electro-optically probing these regions infers portions of the key. For the logical portion of the attack, we integrate the physical attack results into a Boolean satisfiability attack to find the correct key. We evaluate the CLAP attack by launching it against four obfuscation schemes in benchmark circuits. The physical portion of the attack fully specified 60.6% of key bits and partially specified another 10.3%. The logical portion of the attack found the correct key in the physical-attack-limited keyspace in under 30 minutes. Thus, the CLAP attack unlocked each circuit despite obfuscation.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Control Logic Obfuscation Attack in Industrial Control Systems
    Zubair, Nauman
    Ayub, Adeen
    Yoo, Hyunguk
    Ahmed, Irfan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 267 - 272
  • [2] OPUF: Obfuscation Logic Based Physical Unclonable Function
    Ye, Jing
    Hu, Yu
    Li, Xiaowei
    [J]. 2015 IEEE 21ST INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2015, : 156 - 161
  • [3] Attack Graph Obfuscation
    Polad, Hadar
    Puzis, Rami
    Shapira, Bracha
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 269 - 287
  • [4] Logical and Physical Reversibility of Conservative Skyrmion Logic
    Hu, Xuan
    Walker, Benjamin W.
    Garcia-Sanchez, Felipe
    Edwards, Alexander J.
    Zhou, Peng
    Incorvia, Jean Anne C.
    Paler, Alexandru
    Frank, Michael P.
    Friedman, Joseph S.
    [J]. IEEE MAGNETICS LETTERS, 2022, 13
  • [5] A Black-Box Sensitization Attack on SAT-Hard Instances in Logic Obfuscation
    McDaniel, Isaac
    Zuzak, Michael
    Srivastava, Ankur
    [J]. 2022 IEEE 40TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2022), 2022, : 239 - 246
  • [6] Connecting fuzzy logic and argumentation frames via logical attack principles
    Esther Anna Corsi
    Christian G. Fermüller
    [J]. Soft Computing, 2019, 23 : 2255 - 2270
  • [7] Connecting fuzzy logic and argumentation frames via logical attack principles
    Corsi, Esther Anna
    Fermueller, Christian G.
    [J]. SOFT COMPUTING, 2019, 23 (07) : 2255 - 2270
  • [8] MODELS FOR THE COMBINED LOGICAL AND PHYSICAL DESIGN OF DATABASES
    DEWAN, RM
    GAVISH, B
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1989, 38 (07) : 955 - 967
  • [9] A logic obfuscation attack method based on gate-level information flow tracing techniques
    Liu L.
    Zhu J.
    Zhang Z.
    Shen L.
    Sun Y.
    Mu D.
    [J]. Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2024, 42 (01): : 78 - 83
  • [10] Security Analysis of Logic Obfuscation
    Rajendran, Jeyavijayan
    Pino, Youngok
    Sinanoglu, Ozgur
    Karri, Ramesh
    [J]. 2012 49TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2012, : 83 - 89