@inbook{3cdee2a4604b4a0e83ef877aa75c2ab9,
title = "Approximate Attacks",
abstract = "This chapter presents approximate attacks on logic locking, namely AppSAT and Double-DIP. Approximate attacks target compound logic techniques and reduce a compound technique (comprising a low corruptibility technique and a high corruptibility technique) to the low corruptibility technique. AppSAT augments the basic SAT attack with random queries at regular intervals; it terminates when the computed OER is below a certain threshold. Double-DIP makes use 2-DIPs that eliminate at least two incorrect key values per 2-DIP; the attack terminates when 2-DIPs can no longer be found. The effectiveness of the approximate attacks cautions against naive integration of logic locking techniques. This chapter is about approximate attacks on logic locking. Approximate attacks target compound logic locking techniques, reducing the compound technique to its constituent low-corruptibility technique. Section 6.1 introduces compound logic locking techniques that paved the way for the emergence of approximate attacks. Section 6.2 elaborates on the operation of the AppSAT attack [3]. Section 6.3 describes how Double-DIP attack [4] works and how the attack methodology differs from that of the AppSAT attack.",
author = "Muhammad Yasin and Rajendran, {Jeyavijayan (Jv)} and Ozgur Sinanoglu",
note = "Publisher Copyright: {\textcopyright} 2020, Springer Nature Switzerland AG.",
year = "2020",
doi = "10.1007/978-3-030-15334-2_6",
language = "English (US)",
series = "Analog Circuits and Signal Processing",
publisher = "Springer",
pages = "69--76",
booktitle = "Analog Circuits and Signal Processing",
}