Exploiting the Lock: Leveraging MiG-V's Logic Locking for Secret-Data Extraction

The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfus...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Reimann, Lennart M, Yadu Madhukumar Variyar, Huelser, Lennet, Ghinami, Chiara, Germek, Dominik, Leupers, Rainer
Format Paper Journal Article
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 09.08.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The MiG-V was designed for high-security applications and is the first commercially available logic-locked RISC-V processor on the market. In this context logic locking was used to protect the RISC-V processor design during the untrusted manufacturing process by using key-driven logic gates to obfuscate the original design. Although this method defends against malicious modifications, such as hardware Trojans, logic locking's impact on the RISC-V processor's data confidentiality during runtime has not been thoroughly examined. In this study, we evaluate the impact of logic locking on data confidentiality. By altering the logic locking key of the MiG-V while running SSL cryptographic algorithms, we identify data leakages resulting from the exploitation of the logic locking hardware. We show that changing a single bit of the logic locking key can expose 100% of the cryptographic encryption key. This research reveals a critical security flaw in logic locking, highlighting the need for comprehensive security assessments beyond logic locking key-recovery attacks.
ISSN:2331-8422
DOI:10.48550/arxiv.2408.04976