Large-Scale Logic-Locking Attacks via Simulation

被引:1
|
作者
Purdy, Ruben [1 ]
Blanton, R. D. Shawn [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15232 USA
来源
PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022) | 2022年
关键词
Hardware Security; Logic Locking; Obfuscation;
D O I
10.1109/ISQED54688.2022.9806265
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Because IC security has become an increasingly prevalent issue for hardware designers, a number of IC protection schemes have been introduced in the literature. One such scheme, logic locking, involves transforming a hardware design so that it will not operate correctly unless extra inputs (called key inputs) are driven to specific values that are secret. Many existing logic-locking solutions are vulnerable to attacks that uncover the key-input values necessary for correct operation. However, the success of such attacks wane as the size of the design and the number of key inputs increases. In this work, we introduce a logic-locking attack which uses circuit simulators to determine key-input values from large-scale circuits with thousands of added key inputs. Attacks performed on such designs demonstrate the effectiveness of this approach in comparison to other attacks.
引用
收藏
页码:352 / 357
页数:6
相关论文
共 50 条
  • [31] Removal Attacks on Logic Locking and Camouflaging Techniques
    Yasin, Muhammad
    Mazumdar, Bodhisatwa
    Sinanoglu, Ozgur
    Rajendran, Jeyavijayan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 517 - 532
  • [32] Classical Cryptanalysis Attacks on Logic Locking Techniques
    Mazumdar, Bodhisatwa
    Saha, Soma
    Bairwa, Ghanshyam
    Mandal, Souvik
    Nikhil, Tatavarthy Venkat
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (05): : 641 - 654
  • [33] Importance of Logic Locking Attacks in Hardware Security
    Ashika, S.V.
    Sivamangai, N.M.
    Naveenkumar, R.
    Napolean, A.
    IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings, 2023, : 156 - 160
  • [34] THE SIMULATION OF A LARGE-SCALE MILITARY ACTIVITY
    GEISLER, MA
    MANAGEMENT SCIENCE, 1959, 5 (04) : 359 - 368
  • [35] SIMULATION MODELING OF LARGE-SCALE SYSTEMS
    FOSTER, JW
    HOGG, GL
    GONZALEZVEGA, O
    PROCEEDINGS ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 1986, (SYM): : 419 - 426
  • [36] On the Accurate Large-scale Simulation of Ferrofluids
    Huang, Libo
    Hadrich, Torsten
    Michels, Dominik L.
    ACM TRANSACTIONS ON GRAPHICS, 2019, 38 (04):
  • [37] Large-scale simulation models of BGP
    Dimitropoulos, XA
    Riley, GF
    IEEE COMPUTER SOCIETY'S 12TH ANNUAL INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATIONS SYSTEMS - PROCEEDINGS, 2004, : 287 - 294
  • [38] Population generation for large-scale simulation
    Hannon, AC
    King, G
    Morrison, C
    Galstyan, A
    Cohen, P
    ENABLING TECHNOLOGIES FOR SIMULATION SCIENCE IX, 2005, 5805 : 116 - 127
  • [39] LARGE-SCALE SIMULATION OF BRAIN CORTICES
    WITTIE, LD
    SIMULATION, 1978, 31 (03) : 73 - 78
  • [40] LARGE-SCALE COMPUTING IN RESERVOIR SIMULATION
    EWING, RE
    INTERNATIONAL JOURNAL OF SUPERCOMPUTER APPLICATIONS AND HIGH PERFORMANCE COMPUTING, 1988, 2 (04): : 45 - 53