TAAL: Tampering Attack on Any Key-based Logic Locked Circuits

09/16/2019
by   Ziqi Zhou, et al.
0

Due to the globalization of semiconductor manufacturing and test processes, the system-on-a-chip (SoC) designers no longer design the complete SoC and manufacture chips on their own. This outsourcing of design and manufacturing of Integrated Circuits (ICs) has resulted in a number of threats, such as overproduction of ICs, sale of out-of-specification/rejected ICs, and piracy of Intellectual Properties (IPs). Logic locking has emerged as a promising defense strategy against the afore-mentioned threats. However, various attacks pertaining to the extraction of secret keys have undermined the security of logic locking techniques. Over the years, researchers have proposed different techniques to prevent the existing attacks. In this paper, we propose a novel attack which can break any logic locking techniques that relies on stored secret key. This proposed TAAL attack is based on implanting a hardware Trojan in the netlist, which leaks the secret key to an adversary once activated. As an untrusted foundry has the capability to extract the netlist of a design from the layout/mask information, it is feasible for a malicious foundry to implement such a hardware Trojan. All of the three types of TAAL attacks can be used for extracting secret keys. We have introduced the models for both the combinational and sequential hardware Trojans that evade manufacturing tests as well. An adversary only needs to choose one hardware Trojan out of a large set of all possible Trojans to launch the TAAL attack.

READ FULL TEXT

page 1

page 11

research
01/18/2020

DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys

Outsourcing in semiconductor industry opened up venues for faster and co...
research
02/23/2021

Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks

The security of modern electronic devices relies on secret keys stored o...
research
08/18/2022

Reverse Engineering of Integrated Circuits: Tools and Techniques

Consumer and defense systems demanded design and manufacturing of electr...
research
01/11/2023

Resynthesis-based Attacks Against Logic Locking

Logic locking has been a promising solution to many hardware security th...
research
09/05/2022

Hide Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques

Logic locking protects an IC from threats such as piracy of design IP an...
research
10/11/2020

SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection

The emergence of distributed manufacturing ecosystems for electronic har...
research
07/20/2022

EVHA: Explainable Vision System for Hardware Testing and Assurance – An Overview

Due to the ever-growing demands for electronic chips in different sector...

Please sign up or login with your details

Forgot password? Click here to reset