Paper 2019/1443

CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist

Abhrajit Sengupta and Ozgur Sinanoglu

Abstract

CAS-Lock (cascaded locking) is a SAT-resilient locking technique, which can simultaneously thwart SAT and bypass attack, while maintaining non-trivial output corruptibility. Despite all of its theoretical guarantees, in this report we expose a serious flaw in its design that can be exploited to break CAS-Lock. Further, this attack neither requires access to a reverse-engineered netlist, nor it requires a working oracle with the correct key loaded onto the chip's memory. We demonstrate that we can activate any CAS-Locked IC without knowing the secret key.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Hardware securityIP piracyLogic locking
Contact author(s)
as9397 @ nyu edu
History
2019-12-12: received
Short URL
https://ia.cr/2019/1443
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1443,
      author = {Abhrajit Sengupta and Ozgur Sinanoglu},
      title = {CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1443},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/1443}},
      url = {https://eprint.iacr.org/2019/1443}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.