ABSTRACT
Existing logic locking techniques can prevent IP piracy or tampering. However, they often come at the expense of high overhead and are gradually becoming vulnerable to emerging deobfuscation attacks. To protect SoC IPs, we propose O'Clock, a fully-automated clock-gating-based approach that 'locks the clock' to protect IPs in complex SoCs. O'Clock obstructs data/control flows and makes the underlying logic dysfunctional for incorrect keys by manipulating the activity factor of the clock tree. O'Clock has minimal changes to the original design and no change to the IC design flow. Our experimental results show its high resiliency against state-of-the-art de-obfuscation attacks (e.g., oracle-guided SAT, unrolling-/BMC-based SAT, removal, and oracle-less machine learning-based attacks) at negligible power, performance, and area (PPA) overhead.
- Abdulrahman Alaql, Domenic Forte, and Swarup Bhunia. 2019. Sweep to the secret: A constant propagation attack on logic locking. In 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1--6.Google Scholar
- B. Shakya et al. 2017. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation. In Hardware Protection through Obfuscation. Springer, 3--32.Google Scholar
- F. Emnett and M. Biegel. 2000. Power Reduction through RTL Clock Gating. SNUG, San Jose (2000), 1--11.Google Scholar
- H. M. Kamali et al. 2019. Full-Lock: Hard Distributions of SAT Instances for Obfuscating Circuits using Fully Configurable Logic and Routing Blocks. In Design Automation Conference (DAC). 89.Google ScholarDigital Library
- https://www.synopsys.com/designware-ip/technical-bulletin/understanding-powerprofile.html. [n.d.]. Understanding Your Power Profile from RTL to Gate-level Implementation.Google Scholar
- J. A. Roy et al. 2008. EPIC: Ending Piracy of Integrated Circuits. In Conference on Design, Automation and Test in Europe (DATE). 1069--1074.Google Scholar
- J. Rajendran et al. 2012. Security Analysis of Logic Obfuscation. In Design Automation Conference (DAC). 83--89.Google Scholar
- J. Rajendran et al. 2013. Fault Analysis-based Logic Encryption. IEEE Transactions on computers 64, 2 (2013), 410--424.Google ScholarDigital Library
- J. Spars and S. Furber. 2002. Principles Asynchronous Circuit Design. Springer.Google Scholar
- J. Sweeney et al. 2020. Latch-based Logic Locking. In IEEE Int'l Symposium on Hardware Oriented Security and Trust (HOST). 132--141.Google Scholar
- K. Shamsi et al. 2019. KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation. In Design, Automation & Test in Europe Conference & Exhibition (DATE). 534--539.Google ScholarCross Ref
- K. Z. Azar et al. 2021. Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits. IEEE Transactions on VLSI Systems 29, 4 (2021), 643--656.Google ScholarCross Ref
- M. El Massad, et al. 2017. Reverse Engineering Camouflaged Sequential Circuits without Scan Access. In Int'l Conference on CAD (ICCAD). 33--40.Google Scholar
- M. S. Rahman et al. 2021. Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks. ACM Transactions on Design Automation of Electronic Systems (TODAES) 26, 4 (2021), 1--27.Google ScholarDigital Library
- M. Yasin et al. 2016. SARLock: SAT Attack Resistant Logic Locking. In IEEE Int'l Symposium on Hardware Oriented Security and Trust (HOST). 236--241.Google Scholar
- M. Yasin et al. 2017. Provably-Secure Logic Locking: from Theory to Practice. In ACM SIGSAC Conference on CCS. 1601--1618.Google ScholarDigital Library
- M. Yasin et al. 2017. Removal attacks on logic locking and camouflaging techniques. IEEE Transactions on Emerging Topics in Computing 8, 2 (2017), 517--532.Google ScholarCross Ref
- P. Subramanyan et al. 2015. Evaluating the Security of Logic Encryption algorithms. In IEEE Int'l Symposium on HOST. 137--143.Google Scholar
- R. S. Chakraborty and S. Bhunia. 2009. HARPOON: An Obfuscation-based SoC Design Methodology for Hardware Protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 28, 10 (2009), 1493--1502.Google ScholarDigital Library
- S. Roshanisefat et al. 2021. RANE: An Open-Source Formal De-obfuscation Attack for Reverse Engineering of Logic Encrypted Circuits. In Great Lakes Symposium on VLSI (GLSVLSI). 221--228.Google ScholarDigital Library
- T. Meade et al. 2017. Revisit Sequential Logic Obfuscation: Attacks and Defenses. In IEEE Int'l Symposium on Circuits and Systems (ISCAS). 1--4.Google Scholar
- X. Xu et al. 2017. Novel Bypass Attack and BDD-based Tradeoff Analysis against All known Logic Locking Attacks. In Int'l Conference on CHES. 189--210.Google Scholar
Recommendations
LOCK&ROLL: deep-learning power side-channel attack mitigation using emerging reconfigurable devices and logic locking
DAC '22: Proceedings of the 59th ACM/IEEE Design Automation ConferenceThe security and trustworthiness of ICs are exacerbated by the modern globalized semiconductor business model. This model involves many steps performed at multiple locations by different providers and integrates various Intellectual Properties (IPs) ...
Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks
Survey PaperLogic locking has emerged as a promising solution to protect integrated circuits against piracy and tampering. However, the security provided by existing logic locking techniques is often thwarted by Boolean satisfiability (SAT)-based oracle-guided ...
Cyclic Obfuscation for Creating SAT-Unresolvable Circuits
GLSVLSI '17: Proceedings of the on Great Lakes Symposium on VLSI 2017Logic locking and IC camouflaging are proactive circuit obfuscation methods that if proven secure can thwart hardware attacks such as reverse engineering and IP theft. However, the security of both these schemes is called into question by recent SAT ...
Comments