On Preventing SAT Attack with Decoy Key-Inputs
Title | On Preventing SAT Attack with Decoy Key-Inputs |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Nguyen, Quang-Linh, Flottes, Marie-Lise, Dupuis, Sophie, Rouzeyre, Bruno |
Conference Name | 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) |
Keywords | compositionality, Computer architecture, control systems, design-for-trust, hardware security, human factors, intellectual property, ip protection, logic locking, Metrics, overproduction, Predictive Metrics, provable security, pubcrawl, Resiliency, Resistance, SAT attack, Scalability, Supply chains, Switches, Tamper resistance, Very large scale integration |
Abstract | The globalized supply chain in the semiconductor industry raises several security concerns such as IC overproduction, intellectual property piracy and design tampering. Logic locking has emerged as a Design-for-Trust countermeasure to address these issues. Original logic locking proposals provide a high degree of output corruption - i.e., errors on circuit outputs - unless it is unlocked with the correct key. This is a prerequisite for making a manufactured circuit unusable without the designer's intervention. Since the introduction of SAT-based attacks - highly efficient attacks for retrieving the correct key from an oracle and the corresponding locked design - resulting design-based countermeasures have compromised output corruption for the benefit of better resilience against such attacks. Our proposed logic locking scheme, referred to as SKG-Lock, aims to thwart SAT-based attacks while maintaining significant output corruption. The proposed provable SAT-resilience scheme is based on the novel concept of decoy key-inputs. Compared with recent related works, SKG-Lock provides higher output corruption, while having high resistance to evaluated attacks. |
DOI | 10.1109/ISVLSI51109.2021.00031 |
Citation Key | nguyen_preventing_2021 |
- logic locking
- Very large scale integration
- Switches
- supply chains
- SAT attack
- Resistance
- Resiliency
- pubcrawl
- provable security
- Predictive Metrics
- overproduction
- Tamper resistance
- ip protection
- intellectual property
- Hardware Security
- design-for-trust
- control systems
- computer architecture
- Compositionality
- Human Factors
- Metrics
- Scalability