Unraveling Latch Locking Using Machine Learning, Boolean Analysis, and ILP

04/28/2023
by   Dake Chen, et al.
0

Logic locking has become a promising approach to provide hardware security in the face of a possibly insecure fabrication supply chain. While many techniques have focused on locking combinational logic (CL), an alternative latch-locking approach in which the sequential elements are locked has also gained significant attention. Latch (LAT) locking duplicates a subset of the flip-flops (FF) of a design, retimes these FFs and replaces them with latches, and adds two types of decoy latches to obfuscate the netlist. It then adds control circuitry (CC) such that all latches must be correctly keyed for the circuit to function correctly. This paper presents a two-phase attack on latch-locked circuits that uses a novel combination of deep learning, Boolean analysis, and integer linear programming (ILP). The attack requires access to the reverse-engineered netlist but, unlike SAT attacks, is oracle-less, not needing access to the unlocked circuit or correct input/output pairs. We trained and evaluated the attack using the ISCAS'89 and ITC'99 benchmark circuits. The attack successfully identifies a key that is, on average, 96.9 accurate and fully discloses the correct functionality in 8 of the tested 19 circuits and leads to low function corruptibility (less than 4 additional circuits. The attack run-times are manageable.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/28/2017

Reverse Engineering Camouflaged Sequential Integrated Circuits Without Scan Access

Integrated circuit (IC) camouflaging is a promising technique to protect...
research
01/25/2022

HOLL: Program Synthesis for Higher OrderLogic Locking

Logic locking "hides" the functionality of a digital circuit to protect ...
research
01/11/2023

Resynthesis-based Attacks Against Logic Locking

Logic locking has been a promising solution to many hardware security th...
research
01/24/2023

C-SAR: SAT Attack Resistant Logic Locking for RSFQ Circuits

Since the development of semiconductor technologies, exascale computing ...
research
03/31/2020

Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm

Hardware intellectual property (IP) theft is a major issue in today's gl...
research
09/13/2016

Design of a Ternary Edge-Triggered D Flip-Flap-Flop for Multiple-Valued Sequential Logic

Development of large computerized systems requires both combinational an...
research
03/11/2021

Quantifying the Efficacy of Logic Locking Methods

The outsourced manufacturing of integrated circuits has increased the ri...

Please sign up or login with your details

Forgot password? Click here to reset