Breaking CAS-lock and its variants by exploiting structural traces

Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu

Research output: Contribution to journalArticlepeer-review

Abstract

Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miter-based Boolean satisfiability (SAT) attack that steered the research in the direction of developing SAT-resilient schemes. These schemes, however achieved SAT resilience at the cost of low output corruption. Recently, cascaded locking (CAS-Lock) [SXTF20a] was proposed that provides non-trivial output corruption all-the-while maintaining resilience to the SAT attack. Regardless of the theoretical properties, we revisit some of the assumptions made about its implementation, especially about security-unaware synthesis tools, and subsequently expose a set of structural vulnerabilities that can be exploited to break these schemes. We propose our attacks on baseline CAS-Lock as well as mirrored CAS (M-CAS), an improved version of CAS-Lock. We furnish extensive simulation results of our attacks on ISCAS’85 and ITC’99 benchmarks, where we show that CAS-Lock/M-CAS can be broken with ~94% success rate. Further, we open-source all implementation scripts, locked circuits, and attack scripts for the community. Finally, we discuss the pitfalls of point function-based locking techniques including Anti-SAT [XS18] and Stripped Functionality Logic Locking (SFLL-HD) [YSN+ 17], which suffer from similar implementation issues.

Original languageEnglish (US)
Pages (from-to)418-440
Number of pages23
JournalIACR Transactions on Cryptographic Hardware and Embedded Systems
Volume2021
Issue number3
DOIs
StatePublished - Jul 9 2021

Keywords

  • Anti-SAT
  • CAS-Lock/M-CAS
  • IP piracy
  • Logic locking
  • Removal attack
  • SAT attack
  • Structural analysis

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing
  • Software

Fingerprint

Dive into the research topics of 'Breaking CAS-lock and its variants by exploiting structural traces'. Together they form a unique fingerprint.

Cite this