Approximate Attacks

Muhammad Yasin, Jeyavijayan (Jv) Rajendran, Ozgur Sinanoglu

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This chapter presents approximate attacks on logic locking, namely AppSAT and Double-DIP. Approximate attacks target compound logic techniques and reduce a compound technique (comprising a low corruptibility technique and a high corruptibility technique) to the low corruptibility technique. AppSAT augments the basic SAT attack with random queries at regular intervals; it terminates when the computed OER is below a certain threshold. Double-DIP makes use 2-DIPs that eliminate at least two incorrect key values per 2-DIP; the attack terminates when 2-DIPs can no longer be found. The effectiveness of the approximate attacks cautions against naive integration of logic locking techniques. This chapter is about approximate attacks on logic locking. Approximate attacks target compound logic locking techniques, reducing the compound technique to its constituent low-corruptibility technique. Section 6.1 introduces compound logic locking techniques that paved the way for the emergence of approximate attacks. Section 6.2 elaborates on the operation of the AppSAT attack [3]. Section 6.3 describes how Double-DIP attack [4] works and how the attack methodology differs from that of the AppSAT attack.

Original languageEnglish (US)
Title of host publicationAnalog Circuits and Signal Processing
PublisherSpringer
Pages69-76
Number of pages8
DOIs
StatePublished - 2020

Publication series

NameAnalog Circuits and Signal Processing
ISSN (Print)1872-082X
ISSN (Electronic)2197-1854

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Information Systems
  • Signal Processing

Fingerprint

Dive into the research topics of 'Approximate Attacks'. Together they form a unique fingerprint.

Cite this