Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3060403.3060492acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

What to Lock?: Functional and Parametric Locking

Published: 10 May 2017 Publication History

Abstract

Logic locking is an intellectual property (IP) protection technique that prevents IP piracy, reverse engineering and overbuilding attacks by the untrusted foundry or end-users. Existing logic locking techniques are all based on locking the functionality; the design/chip is nonfunctional unless the secret key has been loaded. Existing techniques are vulnerable to various attacks, such as sensitization, key-pruning, and signal skew analysis enabled removal attacks. In this paper, we propose a tenacious and traceless logic locking technique, TTlock, that locks functionality and provably withstands all known attacks, such as SAT-based, sensitization, removal, etc. TTLock protects a secret input pattern; the output of a logic cone is flipped for that pattern, where this flip is restored only when the correct key is applied. Experimental results confirm our theoretical expectations that the computational complexity of attacks launched on TTLock grows exponentially with increasing key-size, while the area, power, and delay overhead increases only linearly. In this paper, we also coin ``parametric locking," where the design/chip behaves as per its specifications (performance, power, reliability, etc.) only with the secret key in place, and an incorrect key downgrades its parametric characteristics. We discuss objectives and challenges in parametric locking.

References

[1]
"Defense Science Board (DSB) study on High Performance Microchip Supply," 2005, {March 16, 2015}. {Online}. Available: www.acq.osd.mil/dsb/reports/ADA435563.pdf\
[2]
R. S. Chakraborty and S. Bhunia, "Security against Hardware Trojan through a Novel Application of Design Obfuscation," IEEE/ACM International Conference on Computer-Aided Design, pp. 113--116, 2009.
[3]
M. Rostami, F. Koushanfar, and R. Karri, "A Primer on Hardware Security: Models, Methods, and Metrics," Proceedings of the IEEE, vol. 102, no. 8, pp. 1283--1295, 2014.
[4]
SypherMedia, "Syphermedia library," http://www.smi.tv/syphermedia_library_circuit_camouflage_technology.html, {April 22, 2016}.
[5]
R. W. Jarvis and M. G. McIntyre, "Split Manufacturing Method for Advanced Semiconductor Circuits," US Patent 7,195,931, 2007.
[6]
J. A. Roy, F. Koushanfar, and I. L. Markov, "Ending Piracy of Integrated Circuits," IEEE Computer, vol. 43, no. 10, pp. 30--38, 2010.
[7]
J. Rajendran, H. Zhang, C. Zhang, G. Rose, Y. Pino, O. Sinanoglu, and R. Karri, "Fault Analysis-Based Logic Encryption," IEEE Transactions on Computers, vol. 64, no. 2, pp. 410--424, 2015.
[8]
R. S. Chakraborty and S. Bhunia, "HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493--1502, 2009.
[9]
M. Yasin, J. Rajendran, O. Sinanoglu, and R. Karri, "On Improving the Security of Logic Locking," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 9, pp. 1411--1424, 2016.
[10]
A. Baumgarten, A. Tyagi, and J. Zambreno, "Preventing IC Piracy Using Reconfigurable Logic Barriers," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 66--75, 2010.
[11]
S. M. Plaza and I. L. Markov, "Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 6, pp. 961--971, 2015.
[12]
P. Subramanyan, S. Ray, and S. Malik, "Evaluating the Security of Logic Encryption Algorithms," IEEE International Symposium on Hardware Oriented Security and Trust, pp. 137--143, 2015.
[13]
M. Yasin, B. Mazumdar, J. J. Rajendran, and O. Sinanoglu, "SARlock: SAT Attack Resistant Logic Locking," IEEE International Symposium on Hardware Oriented Security and Trust, pp. 236--241, 2016.
[14]
Y. Xie and A. Srivastava, "Mitigating SAT Attack on Logic Locking," International Conference on Cryptographic Hardware and Embedded Systems, pp. 127--146, 2016.
[15]
M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran, "Security Analysis of Anti-SAT," IEEE Asia and South Pacific Design Automation Conference, pp. 342--347, 2016.
[16]
J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, "Security Analysis of Logic Obfuscation," IEEE/ACM Design Automation Conference, pp. 83--89, 2012.
[17]
J. E. Stine, I. Castellanos, M. Wood, J. Henson, F. Love, W. R. Davis, P. D. Franzon, M. Bucher, S. Basavarajaiah, J. Oh phet al., "FreePDK: An Open-Source Variation-Aware Design Kit," IEEE International Conference on Microelectronic Systems Education, pp. 173--174, 2007.
[18]
D. D. Gajski, N. D. Dutt, A. C.-H. Wu, and S. Y.-L. Lin, High-level Synthesis: Introduction to Chip and System Design.Norwell, MA, USA: Kluwer Academic Publishers, 1992.

Cited By

View all
  • (2024)Locking-Enabled Security Analysis of Cryptographic CircuitsCryptography10.3390/cryptography80100028:1(2)Online publication date: 5-Jan-2024
  • (2024)KRATT: QBF-Assisted Removal and Structural Analysis Attack Against Logic Locking2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE58400.2024.10546552(1-6)Online publication date: 25-Mar-2024
  • (2024)CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer LevelIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023VLP0018E107.A:3(583-591)Online publication date: 1-Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
GLSVLSI '17: Proceedings of the Great Lakes Symposium on VLSI 2017
May 2017
516 pages
ISBN:9781450349727
DOI:10.1145/3060403
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 May 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. boolean satisfiability
  2. ip piracy
  3. logic encryption
  4. logic locking
  5. reverse engineering

Qualifiers

  • Research-article

Conference

GLSVLSI '17
Sponsor:
GLSVLSI '17: Great Lakes Symposium on VLSI 2017
May 10 - 12, 2017
Alberta, Banff, Canada

Acceptance Rates

GLSVLSI '17 Paper Acceptance Rate 48 of 197 submissions, 24%;
Overall Acceptance Rate 312 of 1,156 submissions, 27%

Upcoming Conference

GLSVLSI '25
Great Lakes Symposium on VLSI 2025
June 30 - July 2, 2025
New Orleans , LA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)49
  • Downloads (Last 6 weeks)2
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Locking-Enabled Security Analysis of Cryptographic CircuitsCryptography10.3390/cryptography80100028:1(2)Online publication date: 5-Jan-2024
  • (2024)KRATT: QBF-Assisted Removal and Structural Analysis Attack Against Logic Locking2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE58400.2024.10546552(1-6)Online publication date: 25-Mar-2024
  • (2024)CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer LevelIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023VLP0018E107.A:3(583-591)Online publication date: 1-Mar-2024
  • (2024)SFLL-AD: a self-adaptive and secure logic lockingIEICE Electronics Express10.1587/elex.20.2023055521:3(20230555-20230555)Online publication date: 10-Feb-2024
  • (2024)CAC 2.0: A Corrupt and Correct Logic Locking Technique Resilient to Structural Analysis Attacks2024 IEEE 25th Latin American Test Symposium (LATS)10.1109/LATS62223.2024.10534592(1-6)Online publication date: 9-Apr-2024
  • (2024)Power Analysis Attack Against post-SAT Logic Locking schemes2024 IEEE European Test Symposium (ETS)10.1109/ETS61313.2024.10567311(1-6)Online publication date: 20-May-2024
  • (2024)Era of Sentinel Tech: Charting Hardware Security Landscapes Through Post-Silicon Innovation, Threat Mitigation and Future TrajectoriesIEEE Access10.1109/ACCESS.2024.340062412(68061-68108)Online publication date: 2024
  • (2023)Expanding In-Cone Obfuscated Tree for Anti SAT Attack2023 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE56975.2023.10137091(1-6)Online publication date: Apr-2023
  • (2023) ObfusLock: An Efficient Obfuscated Locking Framework for Circuit IP Protection † 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE56975.2023.10136964(1-6)Online publication date: Apr-2023
  • (2023)GateLock: Input-Dependent Key-Based Locked Gates for SAT Resistant Logic LockingIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2023.334035032:2(361-371)Online publication date: 28-Dec-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media