Paper 2017/348

Removal Attacks on Logic Locking and Camouflaging Techniques

Muhammad Yasin, Bodhisatwa Mazumdar, Ozugr Sinanoglu, and Jeyavijayan Rajendran

Abstract

With the adoption of a globalized and distributed IC design flow, IP piracy, reverse engineering, and counterfeiting threats are becoming more prevalent. Logic obfuscation techniques including logic locking and IC camouflaging have been developed to address these emergent challenges. A major challenge for logic locking and camouflaging techniques is to resist Boolean satisfiability (SAT) based attacks that can circumvent state-of-the-art solutions within minutes. Over the past year, multiple SAT attack resilient solutions such as Anti-SAT and AND-tree insertion (ATI) have been presented. In this paper, we perform a security analysis of these countermeasures and show that they leave structural traces behind in their attempts to thwart the SAT attack. We present three attacks, namely “signal probability skew” (SPS) attack, “AppSAT guided removal (AGR) attack, and “sensitization guided SAT” (SGS) attack”, that can break Anti-SAT and ATI, within minutes.

Note: A new attack, namely AGR, has been added to the paper.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
hardware securitylogic obfuscationIP piracyreverse eningeeringIC camouflaginglogic lockingremoval attack
Contact author(s)
yasin @ nyu edu
History
2017-08-26: last of 3 revisions
2017-04-26: received
See all versions
Short URL
https://ia.cr/2017/348
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/348,
      author = {Muhammad Yasin and Bodhisatwa Mazumdar and Ozugr Sinanoglu and Jeyavijayan Rajendran},
      title = {Removal Attacks on Logic Locking and Camouflaging Techniques},
      howpublished = {Cryptology ePrint Archive, Paper 2017/348},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/348}},
      url = {https://eprint.iacr.org/2017/348}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.