Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3508352.3549349acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
research-article
Public Access

A Combined Logical and Physical Attack on Logic Obfuscation

Published: 22 December 2022 Publication History

Abstract

Logic obfuscation protects integrated circuits from an untrusted foundry attacker during manufacturing. To counter obfuscation, a number of logical (e.g. Boolean satisfiability) and physical (e.g. electro-optical probing) attacks have been proposed. By definition, these attacks use only a subset of the information leaked by a circuit to unlock it. Countermeasures often exploit the resulting blind-spots to thwart these attacks, limiting their scalability and generalizability. To overcome this, we propose a combined logical and physical attack against obfuscation called the CLAP attack. The CLAP attack leverages both the logical and physical properties of a locked circuit to prune the keyspace in a unified and theoretically-rigorous fashion, resulting in a more versatile and potent attack. To formulate the physical portion of the CLAP attack, we derive a logical formulation that provably identifies input sequences capable of sensitizing logically expressive regions in a circuit. We prove that electro-optically probing these regions infers portions of the key. For the logical portion of the attack, we integrate the physical attack results into a Boolean satisfiability attack to find the correct key. We evaluate the CLAP attack by launching it against four obfuscation schemes in benchmark circuits. The physical portion of the attack fully specified 60.6% of key bits and partially specified another 10.3%. The logical portion of the attack found the correct key in the physical-attack-limited keyspace in under 30 minutes. Thus, the CLAP attack unlocked each circuit despite obfuscation.

References

[1]
https://github.com/mzuzak/CLAP_Attack.git.
[2]
Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, and Avesta Sasan. 2019. SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), 97--122.
[3]
Christian Boit, Shahin Tajik, Philipp Scholz, Elham Amini, Anne Beyreuther, Heiko Lohrke, and Jean-Pierre Seifert. 2016. From ic debug to hardware security risk: The power of backside access and optical interaction. In 2016 IEEE 23rd International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). IEEE, 365--369.
[4]
Robert Brayton and Alan Mishchenko. 2010. ABC: An academic industrial-strength verification tool. In International Conference on Computer Aided Verification. Springer, 24--40.
[5]
Abhishek Chakraborty, Nithyashankari Gummidipoondi Jayasankaran, Yuntao Liu, Jeyavijayan Rajendran, Ozgur Sinanoglu, Ankur Srivastava, Yang Xie, Muhammad Yasin, and Michael Zuzak. 2019. Keynote: A disquisition on logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 39, 10 (2019), 1952--1972.
[6]
Prabuddha Chakraborty, Jonathan Cruz, and Swarup Bhunia. 2018. SAIL: Machine learning guided structural analysis attack on hardware obfuscation. In 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 56--61.
[7]
Jianqi Chen, Monir Zaman, Yiorgos Makris, RD Shawn Blanton, Subhasish Mitra, and Benjamin Carrion Schafer. 2020. DECOY: DEflection-Driven HLS-Based Computation Partitioning for Obfuscating Intellectual PropertY. In 2020 57th ACM/IEEE Design Automation Conference (DAC). IEEE, 1--6.
[8]
Fulvio Corno, Matteo Sonza Reorda, and Giovanni Squillero. 2000. RT-level ITC'99 benchmarks and first ATPG results. IEEE Design & Test of computers 17, 3 (2000), 44--53.
[9]
Sophie Dupuis and Marie-Lise Flottes. 2019. Logic locking: A survey of proposed methods and evaluation metrics. Journal of Electronic Testing 35, 3 (2019), 273--291.
[10]
Mohamed El Massad, Siddharth Garg, and Mahesh V Tripunitara. 2015. Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. In NDSS. 1--14.
[11]
Mark C Hansen, Hakan Yalcin, and John P Hayes. 1999. Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering. IEEE Design & Test of Computers 16, 3 (1999), 72--80.
[12]
Saurabh Joshi, Prateek Kumar, Ruben Martins, and Sukrut Rao. 2018. Approximation strategies for incomplete MaxSAT. In International Conference on Principles and Practice of Constraint Programming. Springer, 219--228.
[13]
Hadi Mardani Kamali, Kimia Zamiri Azar, Houman Homayoun, and Avesta Sasan. 2019. Full-lock: Hard distributions of sat instances for obfuscating circuits using fully configurable logic and routing blocks. In Proceedings of the 56th Annual Design Automation Conference 2019. 1--6.
[14]
Hadi Mardani Kamali, Kimia Zamiri Azar, Houman Homayoun, and Avesta Sasan. 2020. InterLock: An intercorrelated logic and routing locking. In 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD). IEEE, 1--9.
[15]
Ulrike Kindereit. 2014. Fundamentals and future applications of laser voltage probing. In 2014 IEEE International Reliability Physics Symposium. IEEE, 3F-1.
[16]
Ulrike Kindereit, Gary Woods, Jing Tian, Uwe Kerst, Rainer Leihkauf, and Christian Boit. 2007. Quantitative investigation of laser beam modulation in electrically active devices as used in laser voltage probing. IEEE Transactions on Device and Materials Reliability 7, 1 (2007), 19--30.
[17]
Leonidas Lavdas, M Tanjidur Rahman, Mark Tehranipoor, and Navid Asadizanjani. 2020. On Optical Attacks Making Logic Obfuscation Fragile. In 2020 IEEE International Test Conference in Asia (ITC-Asia). IEEE, 71--76.
[18]
Chu Min Li and Felip Manya. 2009. MaxSAT, hard and soft constraints. In Handbook of satisfiability. IOS Press, 613--631.
[19]
Shih Yuan Liu, Hsin Hung Chou, Man Ting Pang, Kuang Yuan Chao, James CC Chang, Jian Chang Lin, and Chun Ming Chen. 2017. Laser voltage imaging and probing, efficient techniques for scan chain verification in advanced node. In 2017 IEEE 24th International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). IEEE, 1--4.
[20]
Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. 2021. Robust and Attack Resilient Logic Locking with a High Application-Level Impact. ACM Journal on Emerging Technologies in Computing Systems (JETC) 17, 3 (2021), 1--22.
[21]
António Morgado, Federico Heras, Mark Liffiton, Jordi Planes, and Joao Marques-Silva. 2013. Iterative and core-guided MaxSAT solving: A survey and assessment. Constraints 18, 4 (2013), 478--534.
[22]
Yin S Ng, Ted Lundquist, Dmitry Skvortsov, Joy Liao, Steven Kasapi, and Howard Marks. 2010. Laser voltage imaging: A new perspective of laser voltage probing. In ISTFA. 5--13.
[23]
M Tanjidur Rahman, Nusrat Farzana Dipu, Dhwani Mehta, Shahin Tajik, Mark Tehranipoor, and Navid Asadizanjani. 2021. CONCEALING-Gate: Optical Contactless Probing Resilient Design. ACM Journal on Emerging Technologies in Computing Systems (JETC) 17, 3 (2021), 1--25.
[24]
M Tanjidur Rahman, Shahin Tajik, M Sazadur Rahman, Mark Tehranipoor, and Navid Asadizanjani. 2020. The key is left under the mat: On the inappropriate security assumption of logic locking schemes. In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 262--272.
[25]
Masoud Rostami, Farinaz Koushanfar, and Ramesh Karri. 2014. A primer on hardware security: Models, methods, and metrics. Proc. IEEE 102, 8 (2014), 1283--1295.
[26]
Akashdeep Saha, Sayandeep Saha, Siddhartha Chowdhury, Debdeep Mukhopadhyay, and Bhargab B Bhattacharya. 2020. LoPher: SAT-Hardened Logic Embedding on Block Ciphers. In 2020 57th ACM/IEEE Design Automation Conference (DAC). IEEE, 1--6.
[27]
Abhrajit Sengupta, Mohammed Nabeel, Nimisha Limaye, Mohammed Ashraf, and Ozgur Sinanoglu. 2020. Truly stripping functionality for logic locking: A fault-based perspective. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 39, 12 (2020), 4439--4452.
[28]
Abhrajit Sengupta, Mohammed Nabeel, Muhammad Yasin, and Ozgur Sinanoglu. 2018. ATPG-based cost-effective, secure logic locking. In 2018 IEEE 36th VLSI Test Symposium (VTS). IEEE, 1--6.
[29]
Bicky Shakya, Xiaolin Xu, Mark Tehranipoor, and Domenic Forte. 2020. CAS-lock: A security-corruptibility trade-off resilient logic locking scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems (2020), 175--202.
[30]
Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z Pan, and Yier Jin. 2017. AppSAT: Approximately deobfuscating integrated circuits. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 95--100.
[31]
Haoting Shen, Navid Asadizanjani, Mark Tehranipoor, and Domenic Forte. 2018. Nanopyramid: An optical scrambler against backside probing attacks. In ISTFA 2018: Proceedings from the 44th International Symposium for Testing and Failure Analysis. ASM International, 280.
[32]
Yuanqi Shen and Hai Zhou. 2017. Double DIP: Re-evaluating security of logic encryption algorithms. In Proceedings of the on Great Lakes Symposium on VLSI 2017. 179--184.
[33]
Deepak Sirone and Pramod Subramanyan. 2020. Functional analysis attacks on logic locking. IEEE Transactions on Information Forensics and Security 15 (2020), 2514--2527.
[34]
Pramod Subramanyan, Sayak Ray, and Sharad Malik. 2015. Evaluating the security of logic encryption algorithms. In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 137--143.
[35]
Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, and Christian Boit. 2017. On the power of optical contactless probing: Attacking bitstream encryption of FPGAs. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1661--1674.
[36]
Yang Xie and Ankur Srivastava. 2018. Anti-sat: Mitigating sat attack on logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 38, 2 (2018), 199--207.
[37]
Fangfei Yang, Ming Tang, and Ozgur Sinanoglu. 2019. Stripped functionality logic locking with Hamming distance-based restore unit (SFLL-hd)-unlocked. IEEE Transactions on Information Forensics and Security 14, 10 (2019), 2778--2786.
[38]
Saeyang Yang. 1991. Logic synthesis and optimization benchmark user guide version 3.0. MCNC, Jan. 1991 (1991).
[39]
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran. 2017. Security analysis of anti-sat. In 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 342--347.
[40]
Muhammad Yasin, Jeyavijayan JV Rajendran, Ozgur Sinanoglu, and Ramesh Karri. 2015. On improving the security of logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 35, 9 (2015), 1411--1424.
[41]
Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran, and Ozgur Sinanoglu. 2017. Provably-secure logic locking: From theory to practice. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1601--1618.
[42]
Michael Zuzak, Yuntao Liu, and Ankur Srivastava. 2020. Trace logic locking: Improving the parametric space of logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 40, 8 (2020), 1531--1544.
[43]
Michael Zuzak, Ankit Mondal, and Ankur Srivastava. 2021. Evaluating the Security of Logic-Locked Probabilistic Circuits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2021).

Cited By

View all
  • (2025)Mitigating Electro-Optical Frequency Mapping Attacks on Logic-Locked Integrated CircuitsJournal of Hardware and Systems Security10.1007/s41635-025-00158-wOnline publication date: 29-Jan-2025
  • (2023)Emergence of Cutting-Edge Technologies on Logic LockingUnderstanding Logic Locking10.1007/978-3-031-37989-5_10(251-277)Online publication date: 23-Sep-2023
  • (2022)Hardware IP Protection against Confidentiality Attacks and Evolving Role of CAD ToolProceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design10.1145/3508352.3561103(1-8)Online publication date: 30-Oct-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design
October 2022
1467 pages
ISBN:9781450392174
DOI:10.1145/3508352
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE-EDS: Electronic Devices Society
  • IEEE CAS
  • IEEE CEDA

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 December 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CLAP attack
  2. EOFM probe
  3. logic obfuscation
  4. untrusted foundry

Qualifiers

  • Research-article

Funding Sources

Conference

ICCAD '22
Sponsor:
ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design
October 30 - November 3, 2022
California, San Diego

Acceptance Rates

Overall Acceptance Rate 457 of 1,762 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)128
  • Downloads (Last 6 weeks)11
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Mitigating Electro-Optical Frequency Mapping Attacks on Logic-Locked Integrated CircuitsJournal of Hardware and Systems Security10.1007/s41635-025-00158-wOnline publication date: 29-Jan-2025
  • (2023)Emergence of Cutting-Edge Technologies on Logic LockingUnderstanding Logic Locking10.1007/978-3-031-37989-5_10(251-277)Online publication date: 23-Sep-2023
  • (2022)Hardware IP Protection against Confidentiality Attacks and Evolving Role of CAD ToolProceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design10.1145/3508352.3561103(1-8)Online publication date: 30-Oct-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media