HOLL: Program Synthesis for Higher OrderLogic Locking

01/25/2022
by   Gourav Takhar, et al.
0

Logic locking "hides" the functionality of a digital circuit to protect it from counterfeiting, piracy, and malicious design modifications. The original design is transformed into a "locked" design such that the circuit reveals its correct functionality only when it is "unlocked" with a secret sequence of bits–the key bit-string. However, strong attacks, especially the SAT attack that uses a SAT solver to recover the key bitstring, have been profoundly effective at breaking the locked circuit and recovering the circuit functionality. We lift logic locking to Higher Order Logic Locking (HOLL) by hiding a higher-order relation, instead of a key of independent values, challenging the attacker to discover this key relation to recreate the circuit functionality. Our technique uses program synthesis to construct the locked design and synthesize a corresponding key relation. HOLL has low overhead and existing attacks for logic locking do not apply as the entity to be recovered is no more a value. To evaluate our proposal, we propose a new attack (SynthAttack) that uses an inductive synthesis algorithm guided by an operational circuit as an input-output oracle to recover the hidden functionality. SynthAttack is inspired by the SAT attack, and similar to the SAT attack, it is verifiably correct, i.e., if the correct functionality is revealed, a verification check guarantees the same. Our empirical analysis shows that SynthAttack can break HOLL for small circuits and small key relations, but it is ineffective for real-life designs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/28/2023

Unraveling Latch Locking Using Machine Learning, Boolean Analysis, and ILP

Logic locking has become a promising approach to provide hardware securi...
research
01/07/2021

Robust and Attack Resilient Logic Locking with a High Application-Level Impact

Logic locking is a hardware security technique to intellectual property ...
research
02/24/2018

SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing

Gate camouflaging is a known security enhancement technique that tries t...
research
11/29/2018

Functional Analysis Attacks on Logic Locking

This paper proposes Functional Analysis attacks on state of the art Logi...
research
07/05/2022

Complexity Analysis of the SAT Attack on Logic Locking

Due to the adoption of horizontal business models following the globaliz...
research
01/11/2023

Resynthesis-based Attacks Against Logic Locking

Logic locking has been a promising solution to many hardware security th...
research
04/08/2021

Algorithmic Obfuscation for LDPC Decoders

In order to protect intellectual property against untrusted foundry, man...

Please sign up or login with your details

Forgot password? Click here to reset