Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/3199700.3199707acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
research-article

CycSAT: SAT-based attack on cyclic logic encryptions

Published: 13 November 2017 Publication History

Abstract

Cyclic logic encryption is a newly proposed circuit obfuscation technique in hardware security. It was claimed to be SAT-unresolvable because feedback cycles were intentionally inserted under keys into the encryption. We show in the paper that even though feedback cycles introduce extra difficulty for an attacker, they can still be overcome with SAT-based techniques. Specifically, we propose CycSAT Algorithms based on SAT with different acyclic conditions that can efficiently decrypt cyclic encryptions. Experimental results have shown that our CycSAT is efficient and effective to decrypt cyclic encryptions, and we need to develop new encryptions with better security properties.

References

[1]
Baumgarten, A., Tyagi, A., and Zambreno, J. Preventing ic piracy using reconfigurable logic barriers. IEEE Design and Test 27, 1 (2010).
[2]
Dupuis, S., Ba, P.-S., Natale, G.D., Flottes, M.-L., and Rouzeyre, B. A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans. In IEEE International On-Line Testing Symposium (2014).
[3]
Edwards, S. A. Making cyclic circuits acyclic. In Proc. of the Design Automation Conf. (2003).
[4]
Li, M., Shamsi, K., Meade, T., Zhao, Z., Yu, B., Jin, Y., and Pan, D. Provably secure camouflaging strategy for ic protection. In Proc. Intl. Conf. on Computer-Aided Design (Austin, TX, Nov. 2016).
[5]
Rajendran, J., Pino, Y., Sinanoglu, O., and Karri, R. Logic encryption: A fault analysis perspective. In Proceedings of the Conference on Design, Automation and Test in Europe (2012), EDA Consortium, pp. 953--958.
[6]
Rajendran, J., Sam, M., Sinanoglu, O., and Karri, R. Security analysis of integrated circuit camouflaging. In CCS (2013).
[7]
Rajendran, J., Zhang, H., Zhang, C., Rose, G. S., Pino, Y., Sinanoglu, O., and Karri, R. Fault analysis-based logic encryption. IEEE Transactions on Computers 64, 2 (Feb. 2015).
[8]
Riedel, M., and Bruck, J. The synthesis of cyclic combinational circuits. In Proc. of the Design Automation Conf. (2003).
[9]
Roy, J. A., Koushanfar, F., and Markov, I. L. EPIC: ending piracy of integrated circuits. In Proceedings of the conference on Design, automation and test in Europe (2008), pp. 1069--1074.
[10]
Shamsi, K., Li, M., Meade, T., Zhao, Z., Pan, D., and Jin, Y. AppSAT: Approximately deobfuscating integrated circuits. In Proc. IEEE International Symposium on Hardware Oriented Security and Trust (May 2017).
[11]
Shamsi, K., Li, M., Meade, T., Zhao, Z., Pan, D., and Jin, Y. Cyclic obfuscation for creating SAT-unresolvable circuits. In Proc. ACM Great Lakes Symposium on VLSI (Banff, AB, Canad, May 2017).
[12]
Shen, Y., and Zhou, H. Double dip: Re-evaluating security of logic encryption algorithms. In Proc. ACM Great Lakes Symposium on VLSI (Banff, AB, Canada, May 2017).
[13]
Subramanyan, P., Ray, S., and Malik, S. Evaluating the security of logic encryption algorithms. In Proc. IEEE International Symposium on Hardware Oriented Security and Trust (2015).
[14]
Xie, Y., and Srivastava, A. Mitigating SAT attack on logic locking. In Conference on Cryptographic Hardware and Embedded Systems (CHES) (2016).
[15]
Yasin, M., Mazumdar, B., Rajendra, J. J. V., and Sinanoglu, O. SARLock: SAT attack resistant logic locking. In Proc. IEEE International Symposium on Hardware Oriented Security and Trust (2016).

Cited By

View all
  • (2019)Full-LockProceedings of the 56th Annual Design Automation Conference 201910.1145/3316781.3317831(1-6)Online publication date: 2-Jun-2019
  • (2019)Protect Your Chip Design Intellectual PropertyProceedings of the International Conference on Omni-Layer Intelligent Systems10.1145/3312614.3312657(211-216)Online publication date: 5-May-2019
  • (2019)On Custom LUT-based ObfuscationProceedings of the 2019 Great Lakes Symposium on VLSI10.1145/3299874.3319496(477-482)Online publication date: 13-May-2019
  • Show More Cited By
  1. CycSAT: SAT-based attack on cyclic logic encryptions

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICCAD '17: Proceedings of the 36th International Conference on Computer-Aided Design
    November 2017
    1077 pages

    Sponsors

    In-Cooperation

    • IEEE-EDS: Electronic Devices Society

    Publisher

    IEEE Press

    Publication History

    Published: 13 November 2017

    Check for updates

    Qualifiers

    • Research-article

    Conference

    ICCAD '17
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 457 of 1,762 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Full-LockProceedings of the 56th Annual Design Automation Conference 201910.1145/3316781.3317831(1-6)Online publication date: 2-Jun-2019
    • (2019)Protect Your Chip Design Intellectual PropertyProceedings of the International Conference on Omni-Layer Intelligent Systems10.1145/3312614.3312657(211-216)Online publication date: 5-May-2019
    • (2019)On Custom LUT-based ObfuscationProceedings of the 2019 Great Lakes Symposium on VLSI10.1145/3299874.3319496(477-482)Online publication date: 13-May-2019
    • (2019)Threats on Logic LockingProceedings of the 2019 Great Lakes Symposium on VLSI10.1145/3299874.3319495(471-476)Online publication date: 13-May-2019
    • (2019)CycSAT-unresolvable cyclic logic encryption using unreachable statesProceedings of the 24th Asia and South Pacific Design Automation Conference10.1145/3287624.3287691(358-363)Online publication date: 21-Jan-2019
    • (2019)BeSATProceedings of the 24th Asia and South Pacific Design Automation Conference10.1145/3287624.3287670(657-662)Online publication date: 21-Jan-2019
    • (2019)Logic LockingJournal of Electronic Testing: Theory and Applications10.1007/s10836-019-05800-435:3(273-291)Online publication date: 1-Jun-2019
    • (2018)A Unifying logic encryption security metricProceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation10.1145/3229631.3229636(179-186)Online publication date: 15-Jul-2018
    • (2018)SRCLockProceedings of the 2018 Great Lakes Symposium on VLSI10.1145/3194554.3194596(153-158)Online publication date: 30-May-2018
    • (2018)Enhancements to SAT AttackACM Transactions on Design Automation of Electronic Systems10.1145/319085323:4(1-25)Online publication date: 9-May-2018
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media