On The Approximation Resiliency Of Logic Locking And Ic Camouflaging Schemes

Keywords

Hardware security; IC camouflaging; logic locking; logic obfuscation

Abstract

The SAT-based attacks are extremely successful in deobfuscating the traditional combinational logic locking and IC camouflaging schemes. While several SAT-resilient protection schemes that increase the minimum query count of the attack have been proposed recently, none of them satisfy the output corruptibility (error) criteria. Therefore, most of them were combined with high corruptibility schemes to achieve both corruptibility and high query count. These 'compound' schemes are successful since existing SAT attacks are agnostic to the corruptibility of the protection scheme. In this paper, we propose an approximate SAT-based attack framework which focuses on the iterative convergence of an attack toward a better solution. This helps our attack reduce a compound scheme to a standalone SAT-resilient scheme. In addition, we relate the problem of minimum query count to a well-known graph problem, and we propose a novel technique to increase the corruptibility of SAT-resilient protection schemes in a controllable manner. This creates protection schemes that have both high query count and corruptibility. Furthermore, due to the approximation resiliency property of these schemes, approximate attacks provide no advantage over exact attacks when attacking them.

Publication Date

2-1-2018

Publication Title

IEEE Transactions on Information Forensics and Security

Volume

14

Issue

2

Number of Pages

347-359

Document Type

Article

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/TIFS.2018.2850319

Socpus ID

85049145007 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/85049145007

This document is currently not available here.

Share

COinS