Cryptology ePrint Archive: Report 2017/348
Removal Attacks on Logic Locking and Camouflaging Techniques
Muhammad Yasin and Bodhisatwa Mazumdar and Ozugr Sinanoglu and Jeyavijayan Rajendran
Abstract: With the adoption of a globalized and distributed IC design flow, IP piracy, reverse engineering, and counterfeiting threats
are becoming more prevalent. Logic obfuscation techniques including logic locking and IC camouflaging have been developed to
address these emergent challenges. A major challenge for logic locking and camouflaging techniques is to resist Boolean satisfiability
(SAT) based attacks that can circumvent state-of-the-art solutions within minutes. Over the past year, multiple SAT attack resilient
solutions such as Anti-SAT and AND-tree insertion (ATI) have been presented. In this paper, we perform a security analysis of these
countermeasures and show that they leave structural traces behind in their attempts to thwart the SAT attack. We present three
attacks, namely “signal probability skew” (SPS) attack, “AppSAT guided removal (AGR) attack, and “sensitization guided SAT” (SGS)
attack”, that can break Anti-SAT and ATI, within minutes.
Category / Keywords: implementation / hardware security, logic obfuscation, IP piracy, reverse eningeering, IC camouflaging, logic locking, removal attack
Date: received 19 Apr 2017, last revised 26 Aug 2017
Contact author: yasin at nyu edu
Available format(s): PDF | BibTeX Citation
Note: A new attack, namely AGR, has been added to the paper.
Version: 20170826:215416 (All versions of this report)
Short URL: ia.cr/2017/348
[ Cryptology ePrint archive ]