Intellectual Property (IP) theft is a serious concern for the integrated circuit (IC) industry. To address this concern, logic locking countermeasure transforms a logic circuit to a different one to obfuscate its inner details. The transformation caused by obfuscation is reversed only upon application of the programmed secret key, thus preserving the circuit's original function. This technique is known to be vulnerable to Satisfiability (SAT)-based attacks. But in order to succeed, SAT-based attacks implicitly assume a perfectly reverse-engineered circuit, which is difficult to achieve in practice due to reverse engineering (RE) errors caused by automated circuit extraction. In this paper, we analyze the effects of random circuit RE-errors on the success of SAT-based attacks. Empirical evaluation on ISCAS, MCNC benchmarks as well as a fully-fledged RISC-V CPU reveals that the attack success degrades exponentially with increase in the number of random RE-errors. Therefore, the adversaries either have to equip RE-tools with near perfection or propose better SAT-based attacks that can work with RE-imperfections.
翻译:知识产权(IP)盗窃是综合电路(IC)行业严重关切的一个问题。为了解决这一关切,逻辑锁定反措施将逻辑电路转换成不同的逻辑电路,以混淆其内部细节。迷惑导致的转变只有在应用了编程秘密钥匙后才能逆转,从而保留了电路的原始功能。众所周知,这一技术很容易受到基于可满足性(SAT)的攻击。但为了取得成功,以SAT为基础的攻击隐含着一种完全反向设计的电路,而由于自动电路提取造成的反向工程错误,这种电路实际上难以实现。在本文中,我们分析了随机电路再入器对以SAT为基础的攻击成功的影响。对ISCAS、MCNC基准以及完全成熟的RISC-V CPU的实证性评价表明,攻击成功随着随机再生器数量的增加而急剧下降。因此,对手要么必须把RE工具装备近于完美,要么建议采用更精确的SAT攻击方法,从而可以与RE-imeffective一起工作。