TY - JOUR
T1 - A Disquisition on Logic Locking
AU - Chakraborty, Abishek
AU - Jayasankaran, Nityashankari Gummidipoondi
AU - Liu, Yuntao
AU - Rajendran, Jeyavijayan
AU - Sinanoglu, Ozgur
AU - Srivastava, Ankur
AU - Xie, Yang
AU - Yasin, Muhammad
AU - Zuzak, Michael
PY - 2019/9/30
Y1 - 2019/9/30
N2 - The fabless business model has given rise to many security threats, including piracy of intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and hardware Trojans (HT). Such threats severely undermine the benefits of the fabless model. Among the countermeasures developed to thwart piracy and RE attacks, logic locking has emerged as a promising and versatile solution that is being adopted by both academia and industry. The idea behind logic locking is to lock the design using a “keying” mechanism; only the rightful owner has control over the locked design. Therefore, the design remains non-functional without the knowledge of the key. In this paper, we survey the evolution of logic locking over the last decade. We introduce various “cat and mouse” games involved in logic locking along with its novel applications—including, processor pipelines, graphics-processing units (GPUs), and analog circuits. We aim this paper to be a primer for researchers interested in developing new logic locking techniques and employing logic locking in different application domains.
AB - The fabless business model has given rise to many security threats, including piracy of intellectual property (IP), overproduction, counterfeiting, reverse engineering (RE), and hardware Trojans (HT). Such threats severely undermine the benefits of the fabless model. Among the countermeasures developed to thwart piracy and RE attacks, logic locking has emerged as a promising and versatile solution that is being adopted by both academia and industry. The idea behind logic locking is to lock the design using a “keying” mechanism; only the rightful owner has control over the locked design. Therefore, the design remains non-functional without the knowledge of the key. In this paper, we survey the evolution of logic locking over the last decade. We introduce various “cat and mouse” games involved in logic locking along with its novel applications—including, processor pipelines, graphics-processing units (GPUs), and analog circuits. We aim this paper to be a primer for researchers interested in developing new logic locking techniques and employing logic locking in different application domains.
M3 - Article
SN - 0278-0070
SP - 1
EP - 1
JO - IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
JF - IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
M1 - 10.1109/TCAD.2019.2944586
ER -