SURF: Joint Structural Functional Attack on Logic Locking

Prabuddha Chakraborty, Jonathan Cruz, S. Bhunia
{"title":"SURF: Joint Structural Functional Attack on Logic Locking","authors":"Prabuddha Chakraborty, Jonathan Cruz, S. Bhunia","doi":"10.1109/HST.2019.8741028","DOIUrl":null,"url":null,"abstract":"To help protect hardware Intellectual Property (IP) blocks against piracy and reverse engineering, researchers have proposed various obfuscation techniques that aim at hiding design intent and making black-box usage difficult. A dominant form of obfuscation, referred to as logic locking, relies on the insertion of key gates (e.g., XOR/XNOR) at strategic locations in a design followed by logic synthesis. Recently, it has been shown that such an approach leaves predictable structural signatures, which make them susceptible to machine learning (ML) based structural attacks. These attacks are shown to deobfuscate a design by learning the deterministic nature of transformations incorporated by commercial synthesis tools. They are attractive for unraveling the design intent. However, they may not be able to provide a working design. In this paper, we introduce a novel attack on obfuscation techniques, called Structural Functional (SURF) attack, which, for the first time to our knowledge, accomplishes key extraction through scalable functional analysis while leveraging the output of structural attacks. We have developed complete flow and an automatic tool for the attack, which shows promising results. We are able to retrieve, on average, ~90% keybits for obfuscated ISCAS-85 benchmarks (100% in several cases) with > 98% output accuracy. We observe that SURF attack, unlike any known attack, can enable both discovering design intent as well as black-box usage. It is effective for all major variants of logic locking; scalable to large designs; and unlike SAT based attacks, is effective for all design types (e.g., multipliers, where SAT based attacks typically fail).","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2019.8741028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26

Abstract

To help protect hardware Intellectual Property (IP) blocks against piracy and reverse engineering, researchers have proposed various obfuscation techniques that aim at hiding design intent and making black-box usage difficult. A dominant form of obfuscation, referred to as logic locking, relies on the insertion of key gates (e.g., XOR/XNOR) at strategic locations in a design followed by logic synthesis. Recently, it has been shown that such an approach leaves predictable structural signatures, which make them susceptible to machine learning (ML) based structural attacks. These attacks are shown to deobfuscate a design by learning the deterministic nature of transformations incorporated by commercial synthesis tools. They are attractive for unraveling the design intent. However, they may not be able to provide a working design. In this paper, we introduce a novel attack on obfuscation techniques, called Structural Functional (SURF) attack, which, for the first time to our knowledge, accomplishes key extraction through scalable functional analysis while leveraging the output of structural attacks. We have developed complete flow and an automatic tool for the attack, which shows promising results. We are able to retrieve, on average, ~90% keybits for obfuscated ISCAS-85 benchmarks (100% in several cases) with > 98% output accuracy. We observe that SURF attack, unlike any known attack, can enable both discovering design intent as well as black-box usage. It is effective for all major variants of logic locking; scalable to large designs; and unlike SAT based attacks, is effective for all design types (e.g., multipliers, where SAT based attacks typically fail).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
逻辑锁定的联合结构功能攻击
为了帮助保护硬件知识产权(IP)块免受盗版和逆向工程的侵害,研究人员提出了各种旨在隐藏设计意图和使黑盒使用困难的混淆技术。混淆的一种主要形式,称为逻辑锁定,依赖于在设计中的战略位置插入关键门(例如,异或/异或),然后进行逻辑合成。最近,研究表明,这种方法留下了可预测的结构签名,这使得它们容易受到基于机器学习(ML)的结构攻击。这些攻击通过学习由商业合成工具合并的转换的确定性特性来消除设计的模糊性。它们对于揭示设计意图很有吸引力。然而,他们可能无法提供工作设计。在本文中,我们介绍了一种新的攻击混淆技术,称为结构功能(SURF)攻击,这是我们所知的第一次通过可扩展的功能分析来完成密钥提取,同时利用结构攻击的输出。我们开发了完整的攻击流程和自动攻击工具,取得了良好的效果。对于混淆的ISCAS-85基准测试,我们平均能够检索到约90%的键位(在某些情况下为100%),输出精度> 98%。我们观察到,与任何已知的攻击不同,SURF攻击既可以发现设计意图,也可以发现黑盒使用。它对所有主要的逻辑锁变体都有效;可扩展到大型设计;与基于SAT的攻击不同,它对所有设计类型都有效(例如,乘数器,而基于SAT的攻击通常会失败)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over GF(2m) based on MSPB RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders Detecting Recycled SoCs by Exploiting Aging Induced Biases in Memory Cells
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1