Appsat: Approximately Deobfuscating Integrated Circuits
Abstract
In today's diversified semiconductor supply-chain, protecting intellectual property (IP) and maintaining manufacturing integrity are important concerns. Circuit obfuscation techniques such as logic encryption and IC camouflaging can potentially defend against a majority of supply-chain threats such as stealthy malicious design modification, IP theft, overproduction, and cloning. Recently, a Boolean Satisfiability (SAT) based attack, namely the SAT attack has been able to deobfuscate almost all traditional circuit obfuscation schemes, and as a result, a number of defense solutions have been proposed in literature. All these defenses are based on the implicit assumption that the attacker needs a perfect deobfuscation accuracy which may not be true in many practical cases. Therefore, in this paper by relaxing the exactness constraint on deobfuscation, we propose the AppSAT attack, an approximate deobfuscation algorithm based on the SAT attack and random testing. We show how the AppSAT attack can deobfuscate 68 out of the 71 benchmark circuits that were obfuscated with state-of-the-art SAT attack defenses with an accuracy of 1/2n, n being the number of inputs. AppSAT shows that with current SAT attack defenses there will be a trade-off between exact-attack resiliency and approximation resiliency.
Publication Date
6-16-2017
Publication Title
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017
Number of Pages
95-100
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/HST.2017.7951805
Copyright Status
Unknown
Socpus ID
85021232936 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/85021232936
STARS Citation
Shamsi, Kaveh; Li, Meng; Meade, Travis; Zhao, Zheng; and Pan, David Z., "Appsat: Approximately Deobfuscating Integrated Circuits" (2017). Scopus Export 2015-2019. 7539.
https://stars.library.ucf.edu/scopus2015/7539