skip to main content
10.1145/3489517.3530606acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article
Open access

Silicon validation of LUT-based logic-locked IP cores

Published: 23 August 2022 Publication History

Abstract

Modern semiconductor manufacturing often leverages a fabless model in which design and fabrication are partitioned. This has led to a large body of work attempting to secure designs sent to an untrusted third party through obfuscation methods. On the other hand, efficient de-obfuscation attacks have been proposed, such as Boolean Satisfiability attacks (SAT attacks). However, there is a lack of frameworks to validate the security and functionality of obfuscated designs. Additionally, unconventional obfuscated design flows, which vary from one obfuscation to another, have been key impending factors in realizing logic locking as a mainstream approach for securing designs. In this work, we address these two issues for Lookup Table-based obfuscation. We study both Volatile and Non-volatile versions of LUT-based obfuscation and develop a framework to validate SAT runtime using machine learning. We can achieve unparallel SAT-resiliency using LUT-based obfuscation while incurring 7% area and less than 1% power overheads. Following this, we discuss and implement a validation flow for obfuscated designs. We then fabricate a chip consisting of several benchmark designs and a RISC-V CPU in TSMC 65nm for post functionality validation. We show that the design flow and SAT-runtime validation can easily integrate LUT-based obfuscation into existing CAD tools while adding minimal verification overhead. Finally, we justify SAT-resilient LUT-based obfuscation as a promising candidate for securing designs.

References

[1]
Christopher M Bishop and Tom M Mitchell. 2014. Pattern Recognition and Machine Learning. (2014).
[2]
C. Poultney et al. 2007. Efficient learning of sparse representations with an energy-based model. In Advances in NIPS. 1137--1144.
[3]
D. Hammond et al. 2011. Wavelets on graphs via spectral graph theory. Applied and Computational Harmonic Analysis 30, 2 (2011), 129--150.
[4]
D. Shuman et al. 2013. The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains. IEEE Signal Processing Magazine 30, 3 (2013), 83--98.
[5]
Michaël et.al. Defferrard. 2016. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering. In Advances in NIPS 29. 3844--3852.
[6]
G. Kolhe et al. 2019. Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality. In 2019 IEEE/ACM ICCAD. 1--8.
[7]
G. Kolhe et al. 2021. Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks. In 2021 58th ACM/IEEE DAC. 229--234.
[8]
Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR.
[9]
G. Kolhe and et al. 2021. Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks. In 2021 58th ACM/IEEE Design Automation Conference (DAC). 229--234.
[10]
L. Xu et al. 2012. SATzilla2012: Improved algorithm selection based on cost-sensitive classification models. Proceedings of SAT Challenge 2012: Solver and Benchmark Descriptions (01 2012), 55--58.
[11]
M. Bronstein et al. 2017. Geometric deep learning: going beyond euclidean data. IEEE Signal Processing Magazine 34, 4 (2017), 18--42.
[12]
P. Subramanyan et al. 2015. Evaluating the Security of Logic Encryption Algorithms. In Int'l Symp. on Hardware Oriented Security and Trust (HOST).

Cited By

View all
  • (2025)GuardianMPC: Backdoor-Resilient Neural Network ComputationIEEE Access10.1109/ACCESS.2025.352830413(11029-11048)Online publication date: 2025
  • (2025)LUT-Based ObfuscationReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_6(85-98)Online publication date: 12-Jan-2025
  • (2025)Evaluating ReBO: Attack Strategies and Security AnalysisReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_5(67-84)Online publication date: 12-Jan-2025
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '22: Proceedings of the 59th ACM/IEEE Design Automation Conference
July 2022
1462 pages
ISBN:9781450391429
DOI:10.1145/3489517
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2022

Check for updates

Author Tags

  1. SAT attack
  2. dynamic obfuscation
  3. emerging devices
  4. logic locking
  5. power side channel attack
  6. reverse engineering

Qualifiers

  • Research-article

Conference

DAC '22
Sponsor:
DAC '22: 59th ACM/IEEE Design Automation Conference
July 10 - 14, 2022
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)227
  • Downloads (Last 6 weeks)18
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)GuardianMPC: Backdoor-Resilient Neural Network ComputationIEEE Access10.1109/ACCESS.2025.352830413(11029-11048)Online publication date: 2025
  • (2025)LUT-Based ObfuscationReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_6(85-98)Online publication date: 12-Jan-2025
  • (2025)Evaluating ReBO: Attack Strategies and Security AnalysisReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_5(67-84)Online publication date: 12-Jan-2025
  • (2025)Classification of ReBO TechniquesReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_4(57-65)Online publication date: 12-Jan-2025
  • (2025)ReBO-Driven IC Design: Leveraging Reconfigurable Logic for ObfuscationReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_3(43-56)Online publication date: 12-Jan-2025
  • (2025)Discussions and the Future of ReBOReconfigurable Obfuscation Techniques for the IC Supply Chain10.1007/978-3-031-77509-3_12(175-182)Online publication date: 12-Jan-2025
  • (2024)S-Tune: SOT-MTJ manufacturing parameters tuning for securing the next generation of computingFrontiers in Electronics10.3389/felec.2024.14095485Online publication date: 7-Aug-2024
  • (2024)An Overview of FPGA-inspired Obfuscation TechniquesACM Computing Surveys10.1145/367711856:12(1-35)Online publication date: 9-Jul-2024
  • (2024)PreLock: Precision Locking for Protecting Embedded Processor2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)10.1109/AsianHOST63913.2024.10838478(1-6)Online publication date: 16-Dec-2024
  • (2023)Circuit Topology-Aware Vaccination-Based Hardware Trojan DetectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.323444042:9(2852-2862)Online publication date: 1-Sep-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media