SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

09/27/2018
by   Prabuddha Chakraborty, et al.
0

Obfuscation is a technique for protecting hardware intellectual property (IP) blocks against reverse engineering, piracy, and malicious modifications. Current obfuscation efforts mainly focus on functional locking of a design to prevent black-box usage. They do not directly address hiding design intent through structural transformations, which is an important objective of obfuscation. We note that current obfuscation techniques incorporate only: (1) local, and (2) predictable changes in circuit topology. In this paper, we present SAIL, a structural attack on obfuscation using machine learning (ML) models that exposes a critical vulnerability of these methods. Through this attack, we demonstrate that the gate-level structure of an obfuscated design can be retrieved in most parts through a systematic set of steps. The proposed attack is applicable to all forms of logic obfuscation, and significantly more powerful than existing attacks, e.g., SAT-based attacks, since it does not require the availability of golden functional responses (e.g. an unlocked IC). Evaluation on benchmark circuits show that we can recover an average of around 84 this attack is scalable, flexible, and versatile.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/29/2020

Scalable Attack-Resistant Obfuscation of Logic Circuits

Hardware IP protection has been one of the most critical areas of resear...
research
04/18/2022

Automatic Hardware Trojan Insertion using Machine Learning

Due to the current horizontal business model that promotes increasing re...
research
10/21/2021

CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

Reverse engineering (RE) in Integrated Circuits (IC) is a process in whi...
research
12/29/2020

UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking

Logic locking aims to protect the intellectual property (IP) of integrat...
research
07/19/2021

Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks

Logic locking has emerged as a prominent key-driven technique to protect...
research
02/01/2021

Side-Channel Trojan Insertion – a Practical Foundry-Side Attack via ECO

Design companies often outsource their integrated circuit (IC) fabricati...
research
06/26/2020

WARDEN: Warranting Robustness Against Deception in Next-Generation Systems

Malicious users of a data center can reverse engineer power-management f...

Please sign up or login with your details

Forgot password? Click here to reset