Exploiting the lock: leveraging MiG-V's logic locking for secret-data extraction.

IF 4.3 3区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences Pub Date : 2025-01-01 Epub Date: 2025-01-16 DOI:10.1098/rsta.2023.0388
Lennart M Reimann, Yadu Madhukumar Variyar, Lennet Huelser, Chiara Ghinami, Dominik Germek, Rainer Leupers
{"title":"Exploiting the lock: leveraging MiG-V's logic locking for secret-data extraction.","authors":"Lennart M Reimann, Yadu Madhukumar Variyar, Lennet Huelser, Chiara Ghinami, Dominik Germek, Rainer Leupers","doi":"10.1098/rsta.2023.0388","DOIUrl":null,"url":null,"abstract":"<p><p>The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context, logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends against malicious modifications, such as hardware Trojans, logic locking's impact on the RISC-V processor's data confidentiality during runtime has not been thoroughly examined. In this study, we evaluate the impact of logic locking on data confidentiality. By altering the logic locking key of the MiG-V while running SSL cryptographic algorithms, we identify data leakages resulting from the exploitation of the logic-locking hardware. We show that changing a single bit of the logic locking key can expose 100% of the cryptographic encryption key. This research reveals a critical security flaw in logic locking, highlighting the need for comprehensive security assessments beyond logic-locking key-recovery attacks.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.</p>","PeriodicalId":19879,"journal":{"name":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","volume":"383 2288","pages":"20230388"},"PeriodicalIF":4.3000,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences","FirstCategoryId":"103","ListUrlMain":"https://doi.org/10.1098/rsta.2023.0388","RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/1/16 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0

Abstract

The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context, logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends against malicious modifications, such as hardware Trojans, logic locking's impact on the RISC-V processor's data confidentiality during runtime has not been thoroughly examined. In this study, we evaluate the impact of logic locking on data confidentiality. By altering the logic locking key of the MiG-V while running SSL cryptographic algorithms, we identify data leakages resulting from the exploitation of the logic-locking hardware. We show that changing a single bit of the logic locking key can expose 100% of the cryptographic encryption key. This research reveals a critical security flaw in logic locking, highlighting the need for comprehensive security assessments beyond logic-locking key-recovery attacks.This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用锁:利用MiG-V的逻辑锁来提取秘密数据。
MiG-V专为高安全性应用而设计,是市场上第一款商用逻辑锁定RISC-V处理器。在这种情况下,逻辑锁定被用于在不可信的制造过程中保护RISC-V处理器设计,通过使用键驱动的逻辑门来混淆原始设计。尽管这种方法可以防止恶意修改,例如硬件木马,但逻辑锁定对运行时期间RISC-V处理器数据机密性的影响还没有得到彻底的研究。在本研究中,我们评估了逻辑锁定对数据机密性的影响。通过在运行SSL加密算法时更改MiG-V的逻辑锁定密钥,我们可以识别由于利用逻辑锁定硬件而导致的数据泄漏。我们证明,更改逻辑锁定密钥的单个比特可以暴露100%的加密加密密钥。这项研究揭示了逻辑锁定中的一个关键安全缺陷,强调了在逻辑锁定密钥恢复攻击之外进行全面安全评估的必要性。本文是“未来安全计算平台的新兴技术”主题的一部分。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
9.30
自引率
2.00%
发文量
367
审稿时长
3 months
期刊介绍: Continuing its long history of influential scientific publishing, Philosophical Transactions A publishes high-quality theme issues on topics of current importance and general interest within the physical, mathematical and engineering sciences, guest-edited by leading authorities and comprising new research, reviews and opinions from prominent researchers.
期刊最新文献
A comprehensive study of quantum arithmetic circuits. Automated polynomial formal verification using generalized binary decision diagram patterns. AxLaM: energy-efficient accelerator design for language models for edge computing. Editorial: new Editor-in-Chief and the 360th anniversary of Philosophical Transactions. Exploiting the lock: leveraging MiG-V's logic locking for secret-data extraction.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1