论文标题

霍尔:高订购锁定的程序合成

HOLL: Program Synthesis for Higher OrderLogic Locking

论文作者

Takhar, Gourav, Karri, Ramesh, Pilato, Christian, Roy, Subhajit

论文摘要

逻辑锁定“隐藏”数字电路的功能,以保护其免受伪造,盗版和恶意设计的修改。原始设计被转换为“锁定”设计,使电路只有在用秘密序列“解锁”时才揭示其正确的功能,即钥匙的位串。但是,强烈的攻击,尤其是使用SAT求解器恢复钥匙的SAT攻击,在打破锁定电路和恢复电路功能方面非常有效。 我们通过隐藏高阶关系,而不是独立值的钥匙来提高逻辑锁定到高阶逻辑锁定(HOLL),从而挑战攻击者发现此关键的关系以重新创建电路功能。我们的技术使用程序合成来构建锁定设计并合成相应的密钥关系。 Holl的开销较低,逻辑锁定的现有攻击不适用,因为要恢复的实体不再是价值。为了评估我们的建议,我们提出了一种新的攻击(Synthattack),该攻击使用由操作电路引导的归纳合成算法作为输入输出甲骨文,以恢复隐藏的功能。 Synthattack的灵感来自SAT攻击,与SAT攻击类似,它是正确正确的,即,如果显示正确的功能,则验证检查可以保证相同。我们的经验分析表明,Synthattack可能会破坏小型电路和小型关键关系,但对现实生活设计却无效。

Logic locking "hides" the functionality of a digital circuit to protect it from counterfeiting, piracy, and malicious design modifications. The original design is transformed into a "locked" design such that the circuit reveals its correct functionality only when it is "unlocked" with a secret sequence of bits--the key bit-string. However, strong attacks, especially the SAT attack that uses a SAT solver to recover the key bitstring, have been profoundly effective at breaking the locked circuit and recovering the circuit functionality. We lift logic locking to Higher Order Logic Locking (HOLL) by hiding a higher-order relation, instead of a key of independent values, challenging the attacker to discover this key relation to recreate the circuit functionality. Our technique uses program synthesis to construct the locked design and synthesize a corresponding key relation. HOLL has low overhead and existing attacks for logic locking do not apply as the entity to be recovered is no more a value. To evaluate our proposal, we propose a new attack (SynthAttack) that uses an inductive synthesis algorithm guided by an operational circuit as an input-output oracle to recover the hidden functionality. SynthAttack is inspired by the SAT attack, and similar to the SAT attack, it is verifiably correct, i.e., if the correct functionality is revealed, a verification check guarantees the same. Our empirical analysis shows that SynthAttack can break HOLL for small circuits and small key relations, but it is ineffective for real-life designs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源