On Improving the Security of Logic Locking
Top Cited Papers
- 22 December 2015
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- Vol. 35 (9), 1411-1424
- https://doi.org/10.1109/tcad.2015.2511144
Abstract
Due to globalization of integrated circuit (IC) design flow, rogue elements in the supply chain can pirate ICs, overbuild ICs, and insert hardware Trojans. EPIC locks the design by randomly inserting additional gates; only a correct key makes the design to produce correct outputs. We demonstrate that an attacker can decipher the locked netlist, in a time linear to the number of keys, by sensitizing the key-bits to the output. We then develop techniques to fix this vulnerability and make an attacker's effort truly exponential in the number of inserted keys. We introduce a new security metric and a method to deliver strong logic locking.Keywords
Funding Information
- Semiconductor Research Corporation and Advanced Technology Investment Company (2013-HJ-2440-S4)
- New York University/New York University Abu Dhabi Center for Research in Information Security Studies and Privacy
- National Science Foundation, and Computing and Communication Foundations (1319841)
- U.S. National Science Foundation
- U.S. Department of Defense
- Semiconductor Research Corporation
- Mubadala Technology
- National Science Foundation (IGERT, Scholarship for Service, Capacity Building, CRI, Cybersecurity)
- Department of Energy (GAANN)
- Air Force Research Laboratory
- Army Research Office
- Cisco
- Intel
This publication has 28 references indexed in Scilit:
- A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- The WTO Agreement on Trade-Related Aspects of Intellectual Property RightsPublished by Edward Elgar Publishing ,2014
- Fault Analysis-Based Logic EncryptionInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2013
- VLSI testing based security metric for IC camouflagingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Logic encryption: A fault analysis perspectivePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware ProtectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2009
- FreePDK: An Open-Source Variation-Aware Design KitPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Foundations of CryptographyPublished by Cambridge University Press (CUP) ,2001
- OCCOM-efficient computation of observability-based code coverage metrics for functional verificationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2001
- Unveiling the ISCAS-85 benchmarks: a case study in reverse engineeringIEEE Design & Test of Computers, 1999