skip to main content
10.1145/3489517.3530542acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

O'clock: lock the clock via clock-gating for SoC IP protection

Published:23 August 2022Publication History

ABSTRACT

Existing logic locking techniques can prevent IP piracy or tampering. However, they often come at the expense of high overhead and are gradually becoming vulnerable to emerging deobfuscation attacks. To protect SoC IPs, we propose O'Clock, a fully-automated clock-gating-based approach that 'locks the clock' to protect IPs in complex SoCs. O'Clock obstructs data/control flows and makes the underlying logic dysfunctional for incorrect keys by manipulating the activity factor of the clock tree. O'Clock has minimal changes to the original design and no change to the IC design flow. Our experimental results show its high resiliency against state-of-the-art de-obfuscation attacks (e.g., oracle-guided SAT, unrolling-/BMC-based SAT, removal, and oracle-less machine learning-based attacks) at negligible power, performance, and area (PPA) overhead.

References

  1. Abdulrahman Alaql, Domenic Forte, and Swarup Bhunia. 2019. Sweep to the secret: A constant propagation attack on logic locking. In 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1--6.Google ScholarGoogle Scholar
  2. B. Shakya et al. 2017. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation. In Hardware Protection through Obfuscation. Springer, 3--32.Google ScholarGoogle Scholar
  3. F. Emnett and M. Biegel. 2000. Power Reduction through RTL Clock Gating. SNUG, San Jose (2000), 1--11.Google ScholarGoogle Scholar
  4. H. M. Kamali et al. 2019. Full-Lock: Hard Distributions of SAT Instances for Obfuscating Circuits using Fully Configurable Logic and Routing Blocks. In Design Automation Conference (DAC). 89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. https://www.synopsys.com/designware-ip/technical-bulletin/understanding-powerprofile.html. [n.d.]. Understanding Your Power Profile from RTL to Gate-level Implementation.Google ScholarGoogle Scholar
  6. J. A. Roy et al. 2008. EPIC: Ending Piracy of Integrated Circuits. In Conference on Design, Automation and Test in Europe (DATE). 1069--1074.Google ScholarGoogle Scholar
  7. J. Rajendran et al. 2012. Security Analysis of Logic Obfuscation. In Design Automation Conference (DAC). 83--89.Google ScholarGoogle Scholar
  8. J. Rajendran et al. 2013. Fault Analysis-based Logic Encryption. IEEE Transactions on computers 64, 2 (2013), 410--424.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Spars and S. Furber. 2002. Principles Asynchronous Circuit Design. Springer.Google ScholarGoogle Scholar
  10. J. Sweeney et al. 2020. Latch-based Logic Locking. In IEEE Int'l Symposium on Hardware Oriented Security and Trust (HOST). 132--141.Google ScholarGoogle Scholar
  11. K. Shamsi et al. 2019. KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation. In Design, Automation & Test in Europe Conference & Exhibition (DATE). 534--539.Google ScholarGoogle ScholarCross RefCross Ref
  12. K. Z. Azar et al. 2021. Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits. IEEE Transactions on VLSI Systems 29, 4 (2021), 643--656.Google ScholarGoogle ScholarCross RefCross Ref
  13. M. El Massad, et al. 2017. Reverse Engineering Camouflaged Sequential Circuits without Scan Access. In Int'l Conference on CAD (ICCAD). 33--40.Google ScholarGoogle Scholar
  14. M. S. Rahman et al. 2021. Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks. ACM Transactions on Design Automation of Electronic Systems (TODAES) 26, 4 (2021), 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Yasin et al. 2016. SARLock: SAT Attack Resistant Logic Locking. In IEEE Int'l Symposium on Hardware Oriented Security and Trust (HOST). 236--241.Google ScholarGoogle Scholar
  16. M. Yasin et al. 2017. Provably-Secure Logic Locking: from Theory to Practice. In ACM SIGSAC Conference on CCS. 1601--1618.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Yasin et al. 2017. Removal attacks on logic locking and camouflaging techniques. IEEE Transactions on Emerging Topics in Computing 8, 2 (2017), 517--532.Google ScholarGoogle ScholarCross RefCross Ref
  18. P. Subramanyan et al. 2015. Evaluating the Security of Logic Encryption algorithms. In IEEE Int'l Symposium on HOST. 137--143.Google ScholarGoogle Scholar
  19. R. S. Chakraborty and S. Bhunia. 2009. HARPOON: An Obfuscation-based SoC Design Methodology for Hardware Protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 28, 10 (2009), 1493--1502.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Roshanisefat et al. 2021. RANE: An Open-Source Formal De-obfuscation Attack for Reverse Engineering of Logic Encrypted Circuits. In Great Lakes Symposium on VLSI (GLSVLSI). 221--228.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. T. Meade et al. 2017. Revisit Sequential Logic Obfuscation: Attacks and Defenses. In IEEE Int'l Symposium on Circuits and Systems (ISCAS). 1--4.Google ScholarGoogle Scholar
  22. X. Xu et al. 2017. Novel Bypass Attack and BDD-based Tradeoff Analysis against All known Logic Locking Attacks. In Int'l Conference on CHES. 189--210.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    DAC '22: Proceedings of the 59th ACM/IEEE Design Automation Conference
    July 2022
    1462 pages
    ISBN:9781450391429
    DOI:10.1145/3489517

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 23 August 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate1,770of5,499submissions,32%

    Upcoming Conference

    DAC '24
    61st ACM/IEEE Design Automation Conference
    June 23 - 27, 2024
    San Francisco , CA , USA

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader