论文标题
HIDE&SEEK:在可证明安全的逻辑锁定技术中寻求(联合国)悬挂键
Hide & Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques
论文作者
论文摘要
逻辑锁定可保护IC免受设计IP盗版等威胁,并在整个IC供应链中未经授权的过量生产。在研究社区提出的几种技术中,由于其算法和可证明的安全保证,可证明安全的逻辑锁定(PSLL)已获得立足点。但是,这些技术的安全性受到攻击者的质疑,这些攻击者利用了硬件实现引起的漏洞。这种攻击(i)主要针对锁定技术,并且(ii)缺乏通用性和可扩展性。这导致了大量的攻击和防守者,发现确定新开发的PSLL技术的安全是一项挑战。此外,没有锁定电路的存储库可以用来基准(并比较)攻击。 在这项工作中,我们开发了一种广泛的攻击,可以在不同的PSLL技术中恢复秘密键。为此,我们根据PSLL技术的硬件结构提取功能和结构属性,并根据VLSI测试和布尔转换的概念开发两次攻击。我们评估了对14个PSLL技术的30,000台锁定电路的攻击,包括9种不间断的技术。我们的攻击成功地恢复了所有技术的秘密密钥(100%精度)。我们对不同(i)技术库,(ii)合成工具和(iii)逻辑优化设置的实验提供了有趣的见解。例如,我们的攻击仅在使用学术综合工具时仅使用锁定电路来恢复秘密密钥。此外,设计人员可以将我们的攻击用作验证工具来确定硬件实现实现的较低安全性。我们将释放我们的工件,这可以帮助促进PSLL域中未来攻击和防御的发展。
Logic locking protects an IC from threats such as piracy of design IP and unauthorized overproduction throughout the IC supply chain. Out of the several techniques proposed by the research community, provably-secure logic locking (PSLL) has acquired a foothold due to its algorithmic and provable-security guarantees. However, the security of these techniques is questioned by attackers that exploit the vulnerabilities arising from the hardware implementation. Such attacks (i) are predominantly specific to locking techniques and (ii) lack generality and scalability. This leads to a plethora of attacks, and defenders, find it challenging to ascertain the security of newly developed PSLL techniques. Additionally, there is no repository of locked circuits that attackers can use to benchmark (and compare) their attacks. In this work, we develop a generalized attack that can recover the secret key across different PSLL techniques. To that end, we extract functional and structural properties depending on the hardware construction of the PSLL techniques and develop two attacks based on the concepts of VLSI testing and Boolean transformations. We evaluate our attacks on 30,000 locked circuits across 14 PSLL techniques, including nine unbroken techniques. Our attacks successfully recover the secret key (100% accuracy) for all the techniques. Our experimentation across different (I) technology libraries, (ii) synthesis tools, and (iii) logic optimization settings provide interesting insights. For instance, our attacks recover the secret key by only using the locked circuit when an academic synthesis tool is used. Additionally, designers can use our attacks as a verification tool to ascertain the lower-bound security achieved by hardware implementations. We shall release our artifacts, which could help foster the development of future attacks and defenses in the PSLL domain.