SAT-hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain

01/23/2020
by   Shervin Roshanisefat, et al.
0

State-of-the-art attacks against cyclic logic obfuscation use satisfiability solvers that are equipped with a set of cycle avoidance clauses. These cycle avoidance clauses are generated in a pre-processing step and define various key combinations that could open or close cycles without making the circuit oscillating or stateful. In this paper, we show that this pre-processing step has to generate cycle avoidance conditions on all cycles in a netlist, otherwise, a missing cycle could trap the solver in an infinite loop or make it exit with an incorrect key. Then, we propose several techniques by which the number of cycles is exponentially increased as a function of the number of inserted feedbacks. We further illustrate that when the number of feedbacks is increased, the pre-processing step of the attack faces an exponential increase in complexity and runtime, preventing the correct composition of cycle avoidance clauses in a reasonable time. On the other hand, if the pre-processing is not concluded, the attack formulated by the satisfiability solver will either get stuck or exit with an incorrect key. Hence, when the cyclic obfuscation under the conditions proposed in this paper is implemented, it would impose an exponentially difficult problem for the satisfiability solver based attacks.

READ FULL TEXT

page 1

page 14

research
04/24/2018

SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware

In this paper, we claim that cyclic obfuscation, when properly implement...
research
09/04/2020

InterLock: An Intercorrelated Logic and Routing Locking

In this paper, we propose a canonical prune-and-SAT (CP SAT) attack fo...
research
05/26/2020

Efficacy of Satisfiability Based Attacks in the Presence of Circuit Reverse Engineering Errors

Intellectual Property (IP) theft is a serious concern for the integrated...
research
07/05/2022

Complexity Analysis of the SAT Attack on Logic Locking

Due to the adoption of horizontal business models following the globaliz...
research
11/19/2012

Storing cycles in Hopfield-type networks with pseudoinverse learning rule: admissibility and network topology

Cyclic patterns of neuronal activity are ubiquitous in animal nervous sy...
research
05/13/2020

Cyclic Bayesian Attack Graphs: A Systematic Computational Approach

Attack graphs are commonly used to analyse the security of medium-sized ...
research
12/08/2021

Dependability Engineering in Isabelle

In this paper, we introduce a process of formal system development suppo...

Please sign up or login with your details

Forgot password? Click here to reset