Efficacy of Satisfiability Based Attacks in the Presence of Circuit Reverse Engineering Errors

05/26/2020
by   Qinhan Tan, et al.
0

Intellectual Property (IP) theft is a serious concern for the integrated circuit (IC) industry. To address this concern, logic locking countermeasure transforms a logic circuit to a different one to obfuscate its inner details. The transformation caused by obfuscation is reversed only upon application of the programmed secret key, thus preserving the circuit's original function. This technique is known to be vulnerable to Satisfiability (SAT)-based attacks. But in order to succeed, SAT-based attacks implicitly assume a perfectly reverse-engineered circuit, which is difficult to achieve in practice due to reverse engineering (RE) errors caused by automated circuit extraction. In this paper, we analyze the effects of random circuit RE-errors on the success of SAT-based attacks. Empirical evaluation on ISCAS, MCNC benchmarks as well as a fully-fledged RISC-V CPU reveals that the attack success degrades exponentially with increase in the number of random RE-errors. Therefore, the adversaries either have to equip RE-tools with near perfection or propose better SAT-based attacks that can work with RE-imperfections.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/24/2018

SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing

Gate camouflaging is a known security enhancement technique that tries t...
research
05/13/2021

High-level Intellectual Property Obfuscation via Decoy Constants

This paper presents a high-level circuit obfuscation technique to preven...
research
03/08/2018

Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack

This is the first work augmenting hardware attacks mounted on obfuscated...
research
08/18/2022

Reverse Engineering of Integrated Circuits: Tools and Techniques

Consumer and defense systems demanded design and manufacturing of electr...
research
07/08/2019

Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding

Anonymity networks are providing practical mechanisms to protect its use...
research
01/23/2020

SAT-hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain

State-of-the-art attacks against cyclic logic obfuscation use satisfiabi...
research
06/16/2022

ALL-MASK: A Reconfigurable Logic Locking Method for Multicore Architecture with Sequential-Instruction-Oriented Key

Intellectual property (IP) piracy has become a non-negligible problem as...

Please sign up or login with your details

Forgot password? Click here to reset