TY - JOUR
T1 - Thwarting All Logic Locking Attacks
T2 - Dishonest Oracle with Truly Random Logic Locking
AU - Limaye, Nimisha
AU - Kalligeros, Emmanouil
AU - Karousos, Nikolaos
AU - Karybali, Irene G.
AU - Sinanoglu, Ozgur
N1 - Funding Information:
Manuscript received June 1, 2020; revised August 1, 2020; accepted September 28, 2020. Date of publication October 6, 2020; date of current version August 20, 2021. This work was supported by the Defense Advanced Research Projects Agency (DARPA)’s Automatic Implementation of Secure Silicon Program under Contract M2002062. The work of Nimisha Limaye was supported by the Global Ph.D. Fellowship at NYU/NYU AD. This article is an extension of [1]. This article was recommended by Associate Editor S. Ghosh. (Corresponding author: Nimisha Limaye.) Nimisha Limaye is with the Department of Electrical and Computer Engineering, Tandon School of Engineering, New York University, Brooklyn, NY 11201 USA (e-mail: nsl278@nyu.edu).
Publisher Copyright:
© 1982-2012 IEEE.
PY - 2021/9
Y1 - 2021/9
N2 - While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e., an oracle, and in particular, heavily use the test access. The proposed technique DisORC turns the oracle into a dishonest one whenever a potential attack is detected. DisORC works on the premise that structural testing of chips need not be performed with the correct functionality. We implement this capability by adding circuitry around a logic-locked design that reconfigures its functionality upon detecting access to scan chains. Any attempt to access scan chains disconnects the secret key from the circuit, and clears all of its traces, isolating and securing it. We also pair this defense with a truly random logic locking (TRLL) scheme that makes random decisions in inserting key gates and retaining signal polarities without relying on any logic synthesis technique to perform bubble pushing. Any netlist analysis-based attack, known or anticipated, will then learn nothing useful to infer the key values. The combined defense DisORC + TRLL thwarts oracle-based and netlist analysis-based attacks while delivering sufficient corruption levels at the outputs. We also show that the proposed defense is cost effective and can be integrated into the design flow easily. The proposed logic locking defense provides protection against untrusted foundry, testing facility, end users, and any combination of them colluding together.
AB - While logic locking is a promising defense to protect hardware designs, many attacks have been shown to undermine its security by retrieving the secret key. All the powerful attacks rely on a working chip, i.e., an oracle, and in particular, heavily use the test access. The proposed technique DisORC turns the oracle into a dishonest one whenever a potential attack is detected. DisORC works on the premise that structural testing of chips need not be performed with the correct functionality. We implement this capability by adding circuitry around a logic-locked design that reconfigures its functionality upon detecting access to scan chains. Any attempt to access scan chains disconnects the secret key from the circuit, and clears all of its traces, isolating and securing it. We also pair this defense with a truly random logic locking (TRLL) scheme that makes random decisions in inserting key gates and retaining signal polarities without relying on any logic synthesis technique to perform bubble pushing. Any netlist analysis-based attack, known or anticipated, will then learn nothing useful to infer the key values. The combined defense DisORC + TRLL thwarts oracle-based and netlist analysis-based attacks while delivering sufficient corruption levels at the outputs. We also show that the proposed defense is cost effective and can be integrated into the design flow easily. The proposed logic locking defense provides protection against untrusted foundry, testing facility, end users, and any combination of them colluding together.
KW - Logic locking
KW - SAT attack
KW - oracle protection
KW - scan chain
KW - sensitization attack
UR - http://www.scopus.com/inward/record.url?scp=85092307359&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85092307359&partnerID=8YFLogxK
U2 - 10.1109/TCAD.2020.3029133
DO - 10.1109/TCAD.2020.3029133
M3 - Article
AN - SCOPUS:85092307359
SN - 0278-0070
VL - 40
SP - 1740
EP - 1753
JO - IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
JF - IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
IS - 9
M1 - 9214869
ER -