Cryptology ePrint Archive: Report 2021/252

A Resource Binding Approach to Logic Obfuscation

Michael Zuzak and Yuntao Liu and Ankur Srivastava

Abstract: Logic locking has been proposed to counter security threats during IC fabrication. Such an approach restricts unauthorized use by injecting sufficient module level error to derail application level IC functionality. However, recent research has identified a trade-off between the error rate of logic locking and its resilience to a Boolean satisfiablity (SAT) attack. As a result, logic locking often cannot inject sufficient error to impact an IC while maintaining SAT resilience. In this work, we propose using architectural context available during resource binding to co-design architectures and locking configurations capable of high corruption and SAT resilience simultaneously. To do so, we propose 2 security-focused binding/locking algorithms and apply them to bind/lock 11 MediaBench benchmarks. The resulting circuits showed a 26x and 99x increase in the application errors of a fixed locking configuration while maintaining SAT resilience and incurring minimal overhead compared to other binding schemes. Locking applied post-binding could not achieve a high application error rate and SAT resilience simultaneously.

Category / Keywords: implementation / Logic Locking, Resource Binding, Untrusted Foundry, Supply-Chain Security

Original Publication (in the same form): Proceedings of The Design Automation Conference (DAC) 2021

Date: received 2 Mar 2021

Contact author: mzuzak at umd edu

Available format(s): PDF | BibTeX Citation

Version: 20210302:205203 (All versions of this report)

Short URL: ia.cr/2021/252


[ Cryptology ePrint archive ]