Global Attack and Remedy on IC-Specific Logic Encryption

Amin Rezaei, Ava Hedayatipour, Hossein Sayadi, Mehrdad Aliasgari, Hai Zhou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In recent years, semiconductor industry has out-sourced the manufacturing to low-cost but not necessarily trusted foundries. This fabless business model encounters new security challenges, including piracy and overproduction. A well-studied solution to prevent unauthorized products from functioning is logic encryption, where a chip is encrypted using a key only known to the designer. However, the majority of the logic encryption solutions are vulnerable due to key uniformity and probing attacks. In this paper, we first present GSAT, a Global attack on existing IC-specific logic encryption schemes using the SAT model, that effectively deciphers the hidden global key pluggable to all the encrypted ICs. Next, we propose a highly secure and low-cost remedy called SPLEnD: Strong PUF -based Logic Encryption Design. Traditional I C-specific encryption schemes are vulnerable to GSAT attack, while SPLEnD not only effectively resists GSAT, but also balances security and efficiency.

Original languageEnglish (US)
Title of host publicationProceedings of the 2022 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages145-148
Number of pages4
ISBN (Electronic)9781665485326
DOIs
StatePublished - 2022
Event2022 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022 - Washington, United States
Duration: Jun 27 2022Jun 30 2022

Publication series

NameProceedings of the 2022 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022

Conference

Conference2022 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022
Country/TerritoryUnited States
CityWashington
Period6/27/226/30/22

Keywords

  • Logic Encryption
  • Logic Locking
  • Physical Un-clonable Function
  • Probing Attack
  • SAT-based Attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electrical and Electronic Engineering
  • Safety, Risk, Reliability and Quality
  • Electronic, Optical and Magnetic Materials

Fingerprint

Dive into the research topics of 'Global Attack and Remedy on IC-Specific Logic Encryption'. Together they form a unique fingerprint.

Cite this