簡易檢索 / 詳目顯示

研究生: 許立農
Hsu, Li-Nung
論文名稱: 建構加密混淆樹以對抗布林滿足性攻擊的邏輯鎖定方法
Constructing Obfuscated Tree for Anti-Sat Attack in Logic Locking
指導教授: 黃婷婷
Hwang, Ting-Ting
口試委員: 吳中浩
Wu, Allen C.-H.
陳勇志
Chen, Yung-Chih
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2022
畢業學年度: 110
語文別: 英文
論文頁數: 52
中文關鍵詞: 硬體安全混淆樹邏輯鎖定邏輯鎖定布林滿足性攻擊
外文關鍵詞: Hardware Security, Tree-Based Logic Locking, Logic Locking, SAT Attack
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 邏輯鎖定是一種硬體安全技術,用以保護電路設計免受過度製造、設計盜竊及逆向工程的侵害。邏輯鎖定藉由插入額外的邏輯閘如多工器、互斥閘及查找表(LUT),將電路設計上鎖。只有當正確的密鑰被套用時,才能夠正確的啟用電路的功能。布林滿足性攻擊(SAT attack)是對於邏輯鎖定最強力的攻擊方式,他利用SAT 求解器快速的排除錯誤的密鑰組合。布林滿足性攻擊可以在短時間內輕易地破解早期的邏輯鎖定技術。近來,已經有非常多的研究提出了對抗布林滿足性攻擊的邏輯鎖定方法,其中一種是以加密電路中的point function來保護電路,例如與樹(AND-tree)。

    然而,電路中的與樹存在著兩個問題。首先,在某些電路中,與樹的大小並不能滿足加密的基本需求。第二,對於布林滿足性攻擊來說,與樹的加密方法存在著某些條件使得攻擊能夠經歷一個迭代就完成。本研究提出了一建構加密混淆樹方法。首先利用combine-concatenate操作將電路中的與樹合併為更大的與樹,接著會藉由split-compensate操作進一步放大合併後的與樹,並降低remove-all DIP的影響。實驗結果顯示,此方法在大部分的電路中可以有效地抵禦布林滿足性攻擊,並且在不同的加密條件下,部分的電路的加密效果能夠優於先前的防禦技術。


    Logic locking is a hardware security technology to protect circuit designs from IP overuse, IP Piracy, and reverse engineering. Logic locking protects circuits by inserting key gates such as MUX gates, XOR/XNOR gates, and LUTs. The circuit will be correct only when the correct key is applied. SAT attack is the most powerful attack in recent times. It uses an SAT solver to prune the wrong key quickly. For the early defense, SAT attacks can easily succeed in a short time. Previous studies have presented many techniques for defending against SAT attacks. One of them is to protect circuits by encrypting in-cone point-function, i.e., AND-tree.

    However, in-cone AND-tree has some problems. First of all, in the circuit, its size cannot meet the encryption requirements, and secondly, for the SAT attack, there is a specific condition that allows the attack to succeed in one iteration. In this paper, we present a new method for constructing obfuscated trees. We first use combine-concatenate operations to combine AND-trees in a circuit to obtain a larger AND-tree and then use split-compensate operations to insert extra variables further amplify the AND-tree and reduce the impact of remove-all DIP. The experimental results show that our obfuscated tree can effectively resist SAT attacks. We can achieve better results under different encryption conditions than previous methods.

    Acknowledgements 摘要 i Abstract ii 1 Introduction 1 2 Previous Work 4 3 Motivation 6 4 Properties of Obfuscated Tree 8 4.1 Basic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 4.2 Propagating Obfuscated Tree to Output . . . . . . . . . . . . . . . . . . . . . .13 4.3 Expanding Obfuscated Tree by Combine-Concatenate Operation . . . . . . . . . . . 19 4.4 Expanding Obfuscated Tree by Split-Compensate Operation . . . . . . . . . . . . .24 5 Constructing Obfuscated Tree 32 5.1 De Morgan Transformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 5.2 AND-tree Combine-Concatenate . . . . . . . . . . . . . . . . . . . . . . . . . . 35 5.3 Internal and External Variable Insertions . . . . . . . . . . . . . . . . . . . 39 6 Experimental Results 40 6.1 Effect of Combine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 6.2 Effect of Extra Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 6.3 Effectiveness of Anti-SAT Attack . . . . . . . . . . . . . . . . . . . . . . . . 45 7 Conclusions and Future Works 50 References 51

    [1] P. Subramanyan, S. Ray, and S. Malik, “Evaluating the security of logic encryption al-
    gorithms,” in 2015 IEEE International Symposium on Hardware Oriented Security and
    Trust (HOST), pp. 137–143, 2015.
    [2] A. Alaql and S. Bhunia, “Saro: Scalable attack-resistant logic locking,” IEEE Transac-
    tions on Information Forensics and Security, vol. 16, pp. 3724–3739, 2021.
    [3] M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran, “Camoperturb: Secure ic
    camouflaging for minterm protection,” in 2016 IEEE/ACM International Conference on
    Computer-Aided Design (ICCAD), pp. 1–8, 2016.
    [4] Y.-C. CHEN, “Smartlock: Sat attack and removal attack-resistant tree-based logic lock-
    ing,” IEICE Transactions on Fundamentals of Electronics, Communications and Com-
    puter Sciences, vol. E103.A, no. 5, pp. 733–740, 2020.
    [5] M. Li, K. Shamsi, T. Meade, Z. Zhao, B. Yu, Y. Jin, and D. Z. Pan, “Provably secure
    camouflaging strategy for ic protection,” IEEE Transactions on Computer-Aided Design
    of Integrated Circuits and Systems, vol. 38, no. 8, pp. 1399–1412, 2019.
    [6] Y. Xie and A. Srivastava, “Anti-sat: Mitigating sat attack on logic locking,” IEEE Trans-
    actions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, no. 2,
    pp. 199–207, 2019.
    [7] M. Yasin, B. Mazumdar, J. J. V. Rajendran, and O. Sinanoglu, “Sarlock: Sat attack resis-
    tant logic locking,” in 2016 IEEE International Symposium on Hardware Oriented Secu-
    rity and Trust (HOST), pp. 236–241, 2016.
    [8] M. Yasin, B. Mazumdar, O. Sinanoglu, and J. Rajendran, “Security analysis of anti-sat,” in
    2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 342–
    347, 2017.
    [9] M. Yasin, A. Sengupta, M. T. Nabeel, M. Ashraf, J. J. Rajendran, and O. Sinanoglu,
    “Provably-secure logic locking: From theory to practice,” in Proceedings of the 2017
    ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, (New
    York, NY, USA), p. 1601–1618, Association for Computing Machinery, 2017.
    [10] M. Yasin, A. Sengupta, B. C. Schafer, Y. Makris, O. Sinanoglu, and J. J. Rajendran, “What
    to lock? functional and parametric locking,” in Proceedings of the on Great Lakes Sym-
    posium on VLSI 2017, GLSVLSI ’17, (New York, NY, USA), p. 351–356, Association
    for Computing Machinery, 2017.
    [11] J. A. Roy, F. Koushanfar, and I. L. Markov, “Epic: Ending piracy of integrated circuits,”
    in 2008 Design, Automation and Test in Europe, pp. 1069–1074, 2008.
    51
    [12] J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, “Security analysis of logic obfuscation,”
    in DAC Design Automation Conference 2012, pp. 83–89, 2012.
    [13] M. Yasin, J. J. Rajendran, O. Sinanoglu, and R. Karri, “On improving the security of
    logic locking,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and
    Systems, vol. 35, no. 9, pp. 1411–1424, 2016.

    QR CODE