Large-Scale Logic-Locking Attacks via Simulation

被引:1
|
作者
Purdy, Ruben [1 ]
Blanton, R. D. Shawn [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15232 USA
来源
PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022) | 2022年
关键词
Hardware Security; Logic Locking; Obfuscation;
D O I
10.1109/ISQED54688.2022.9806265
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Because IC security has become an increasingly prevalent issue for hardware designers, a number of IC protection schemes have been introduced in the literature. One such scheme, logic locking, involves transforming a hardware design so that it will not operate correctly unless extra inputs (called key inputs) are driven to specific values that are secret. Many existing logic-locking solutions are vulnerable to attacks that uncover the key-input values necessary for correct operation. However, the success of such attacks wane as the size of the design and the number of key inputs increases. In this work, we introduce a logic-locking attack which uses circuit simulators to determine key-input values from large-scale circuits with thousands of added key inputs. Attacks performed on such designs demonstrate the effectiveness of this approach in comparison to other attacks.
引用
收藏
页码:352 / 357
页数:6
相关论文
共 50 条
  • [21] A DIVERSE LARGE-SCALE DATASET FOR EVALUATING REBROADCAST ATTACKS
    Agarwal, Shruti
    Fan, Wei
    Farid, Hany
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 1997 - 2001
  • [22] Impact analysis of faults and attacks in large-scale networks
    Hariri, Salim
    Guangzhi, Q.U.
    Dharmagadda, Tushneem
    Ramkishore, Modukuri
    Raghavendra, Cauligi S.
    IEEE Security and Privacy, 2003, 1 (05): : 49 - 54
  • [23] Large-scale network monitoring for visual analysis of attacks
    Fischer, Fabian
    Mansmann, Florian
    Keim, Daniel A.
    Pietzko, Stephan
    Waldvogel, Marcel
    VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 111 - 118
  • [24] Economics of Ransomware: Risk Interdependence and Large-Scale Attacks
    August, Terrence
    Dao, Duy
    Niculescu, Marius Florin
    MANAGEMENT SCIENCE, 2022, 68 (12) : 8979 - 9002
  • [25] An economic damage model for large-scale Internet attacks
    Dübendorfer, T
    Wagner, A
    Plattner, B
    THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2004, : 223 - 228
  • [26] Anomaly-based Identification of Large-Scale Attacks
    Gamer, Thomas
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6638 - 6643
  • [27] Classical Cryptanalysis Attacks on Logic Locking Techniques
    Bodhisatwa Mazumdar
    Soma Saha
    Ghanshyam Bairwa
    Souvik Mandal
    Tatavarthy Venkat Nikhil
    Journal of Electronic Testing, 2019, 35 : 641 - 654
  • [28] Obviating Multiple Attacks with Enhanced Logic Locking
    Paul, Anu
    Mohankumar, N.
    Devi, M. Nirmala
    ACM International Conference Proceeding Series, 2022, : 162 - 167
  • [29] LL-ATPG: Logic-Locking Aware Test Using Valet Keys in an Untrusted Environment
    Rahman, M. Sazadur
    Li, Henian
    Guo, Rui
    Rahman, Fahim
    Farahmandi, Farimah
    Tehranipoor, Mark
    2021 IEEE INTERNATIONAL TEST CONFERENCE (ITC 2021), 2021, : 180 - 189
  • [30] Shielding Logic Locking from Redundancy Attacks
    Li, Leon
    Orailoglu, Alex
    2019 IEEE 37TH VLSI TEST SYMPOSIUM (VTS), 2019,