157 research outputs found
Removal Attacks on Logic Locking and Camouflaging Techniques
With the adoption of a globalized and distributed IC design flow, IP piracy, reverse engineering, and counterfeiting threats
are becoming more prevalent. Logic obfuscation techniques including logic locking and IC camouflaging have been developed to
address these emergent challenges. A major challenge for logic locking and camouflaging techniques is to resist Boolean satisfiability
(SAT) based attacks that can circumvent state-of-the-art solutions within minutes. Over the past year, multiple SAT attack resilient
solutions such as Anti-SAT and AND-tree insertion (ATI) have been presented. In this paper, we perform a security analysis of these
countermeasures and show that they leave structural traces behind in their attempts to thwart the SAT attack. We present three
attacks, namely “signal probability skew” (SPS) attack, “AppSAT guided removal (AGR) attack, and “sensitization guided SAT” (SGS)
attack”, that can break Anti-SAT and ATI, within minutes
A survey on security analysis of machine learning-oriented hardware and software intellectual property
Intellectual Property (IP) includes ideas, innovations, methodologies, works of authorship (viz., literary and artistic works), emblems, brands, images, etc. This property is intangible since it is pertinent to the human intellect. Therefore, IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent. IP protection regulations have been deployed and are still in practice, including patents, copyrights, contracts, trademarks, trade secrets, etc., to address these challenges. Unfortunately, these protections are insufficient to keep IP entities from being changed or stolen without permission. As for this, some IPs require hardware IP protection mechanisms, and others require software IP protection techniques. To secure these IPs, researchers have explored the domain of Intellectual Property Protection (IPP) using different approaches. In this paper, we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research; provide discussions on hardware IP and software IP attacks and defense techniques; summarize different applications of IP protection; and lastly, identify the challenges and future research prospects in hardware and software IP security
KRATT: QBF-Assisted Removal and Structural Analysis Attack Against Logic Locking
This paper introduces KRATT, a removal and structural analysis attack against
state-of-the-art logic locking techniques, such as single and double flip
locking techniques (SFLTs and DFLTs). KRATT utilizes powerful quantified
Boolean formulas (QBFs), which have not found widespread use in hardware
security, to find the secret key of SFLTs for the first time. It can handle
locked circuits under both oracle-less (OL) and oracle-guided (OG) threat
models. It modifies the locked circuit and uses a prominent OL attack to make a
strong guess under the OL threat model. It uses a structural analysis technique
to identify promising protected input patterns and explores them using the
oracle under the OG model. Experimental results on ISCAS'85, ITC'99, and HeLLO:
CTF'22 benchmarks show that KRATT can break SFLTs using a QBF formulation in
less than a minute, can decipher a large number of key inputs of SFLTs and
DFLTs with high accuracy under the OL threat model, and can easily find the
secret key of DFLTs under the OG threat model. It is shown that KRATT
outperforms publicly available OL and OG attacks in terms of solution quality
and run-time
- …