Logic locking protects an IC from threats such as piracy of design IP and unauthorized overproduction throughout the IC supply chain. Out of the several techniques proposed by the research community, provably-secure logic locking (PSLL) has acquired a foothold due to its algorithmic and provable-security guarantees. However, the security of these techniques is questioned by attackers that exploit the vulnerabilities arising from the hardware implementation. Such attacks (i) are predominantly specific to locking techniques and (ii) lack generality and scalability. This leads to a plethora of attacks, and defenders, find it challenging to ascertain the security of newly developed PSLL techniques. Additionally, there is no repository of locked circuits that attackers can use to benchmark (and compare) their attacks. In this work, we develop a generalized attack that can recover the secret key across different PSLL techniques. To that end, we extract functional and structural properties depending on the hardware construction of the PSLL techniques and develop two attacks based on the concepts of VLSI testing and Boolean transformations. We evaluate our attacks on 30,000 locked circuits across 14 PSLL techniques, including nine unbroken techniques. Our attacks successfully recover the secret key (100% accuracy) for all the techniques. Our experimentation across different (I) technology libraries, (ii) synthesis tools, and (iii) logic optimization settings provide interesting insights. For instance, our attacks recover the secret key by only using the locked circuit when an academic synthesis tool is used. Additionally, designers can use our attacks as a verification tool to ascertain the lower-bound security achieved by hardware implementations. We shall release our artifacts, which could help foster the development of future attacks and defenses in the PSLL domain.
翻译:逻辑锁定(PSLL)因其算法和可变安全保障而获得一个立足点。然而,这些技术的安全却受到利用硬件实施产生的弱点的攻击者的质疑。这些攻击(一)主要针对锁定技术,(二)主要针对锁定技术,(二)缺乏全面性和可缩放性。这导致大量袭击和捍卫者,发现难以确定新开发的PSLLL技术的安全性。此外,没有固定的逻辑锁定电路库,攻击者可以用来衡量(比较)其攻击。在这项工作中,我们开发了一种通用攻击,可以收回不同PSLLLL技术中的秘密密钥。为此,我们根据PSLLLL技术的硬件构造,并根据VLSI工具测试和Boolean更低的变异性概念开发了两起攻击。我们评估了在14个PSLLLLLL技术新开发的30 000个固定电路路段的防御系统。(PSLLLLLII技术,包括9个硬性实验技术) 成功地利用了我们的关键技术来恢复了我们的安全性攻击。(我们的核心技术)。我们的安全系统,我们的所有系统,我们用了一种未来工具。我们的工具,我们用了一个不同技术来回收了我们的安全工具。