TY - CHAP
T1 - Pre-SAT Logic Locking
AU - Yasin, Muhammad
AU - Rajendran, Jeyavijayan (Jv)
AU - Sinanoglu, Ozgur
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - This chapter focuses on the Pre-SAT logic locking, presenting three techniques, RLL, FLL, and SLL, in addition to describing the sensitization attack. RLL is the earliest known logic locking technique that was introduced to thwart IC piracy. FLL improves upon RLL and prevents the black-box usage of an IC. However, both RLL and FLL remain susceptible to the sensitization attack, which retrieves the key bits from a functional IC in a divide-and-conquer fashion. SLL thwarts the sensitization attack by inserting key gates that exhibit strong interference among themselves and make it hard to retrieve key bits on an individual basis. This chapter is about the Pre-SAT logic locking techniques. Section 3.1 introduces RLL, the first-ever logic locking technique. Section 3.2 describes FLL, which improves upon RLL to prevent the black-box usage of an IC. Section 3.3 focuses on the sensitization attack, the first algorithmic attack on logic locking. Section 3.3 presents SLL as a countermeasure to the sensitization attack.
AB - This chapter focuses on the Pre-SAT logic locking, presenting three techniques, RLL, FLL, and SLL, in addition to describing the sensitization attack. RLL is the earliest known logic locking technique that was introduced to thwart IC piracy. FLL improves upon RLL and prevents the black-box usage of an IC. However, both RLL and FLL remain susceptible to the sensitization attack, which retrieves the key bits from a functional IC in a divide-and-conquer fashion. SLL thwarts the sensitization attack by inserting key gates that exhibit strong interference among themselves and make it hard to retrieve key bits on an individual basis. This chapter is about the Pre-SAT logic locking techniques. Section 3.1 introduces RLL, the first-ever logic locking technique. Section 3.2 describes FLL, which improves upon RLL to prevent the black-box usage of an IC. Section 3.3 focuses on the sensitization attack, the first algorithmic attack on logic locking. Section 3.3 presents SLL as a countermeasure to the sensitization attack.
UR - http://www.scopus.com/inward/record.url?scp=85103883030&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85103883030&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-15334-2_3
DO - 10.1007/978-3-030-15334-2_3
M3 - Chapter
AN - SCOPUS:85103883030
T3 - Analog Circuits and Signal Processing
SP - 33
EP - 46
BT - Analog Circuits and Signal Processing
PB - Springer
ER -