Generalized SAT-Attack-Resistant Logic Locking
Logic locking is used to protect integrated circuits (ICs) from piracy and counterfeiting. An encrypted IC implements the correct function only when the right key is input. Many existing logic-locking methods are subject to the powerful satisfiability (SAT)-based attack. Recently, an Anti-SAT scheme...
Saved in:
Published in | IEEE transactions on information forensics and security Vol. 16; pp. 2581 - 2592 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
IEEE
2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Logic locking is used to protect integrated circuits (ICs) from piracy and counterfeiting. An encrypted IC implements the correct function only when the right key is input. Many existing logic-locking methods are subject to the powerful satisfiability (SAT)-based attack. Recently, an Anti-SAT scheme has been developed. By adopting two complementary logic blocks that consist of AND/NAND trees, it makes the number of iterations needed by the SAT attack exponential to the number of input bits. Nevertheless, the Anti-SAT scheme is vulnerable to the later AppSAT and removal attacks. This article proposes a generalized (G-)Anti-SAT scheme. Different from the Anti-SAT scheme, a variety of complementary or non-complementary functions can be adopted for the two blocks in our G-Anti-SAT scheme. The Anti-SAT scheme is just a special case of our proposed design. Our design can achieve higher output corruptibility, which is also tunable, so that better resistance to the AppSAT and removal attacks is achieved. Meanwhile, unlike existing AppSAT-resilient designs, our design does not sacrifice the resistance to the SAT attack. |
---|---|
AbstractList | Logic locking is used to protect integrated circuits (ICs) from piracy and counterfeiting. An encrypted IC implements the correct function only when the right key is input. Many existing logic-locking methods are subject to the powerful satisfiability (SAT)-based attack. Recently, an Anti-SAT scheme has been developed. By adopting two complementary logic blocks that consist of AND/NAND trees, it makes the number of iterations needed by the SAT attack exponential to the number of input bits. Nevertheless, the Anti-SAT scheme is vulnerable to the later AppSAT and removal attacks. This article proposes a generalized (G-)Anti-SAT scheme. Different from the Anti-SAT scheme, a variety of complementary or non-complementary functions can be adopted for the two blocks in our G-Anti-SAT scheme. The Anti-SAT scheme is just a special case of our proposed design. Our design can achieve higher output corruptibility, which is also tunable, so that better resistance to the AppSAT and removal attacks is achieved. Meanwhile, unlike existing AppSAT-resilient designs, our design does not sacrifice the resistance to the SAT attack. |
Author | Zhang, Xinmiao Zhou, Jingbo |
Author_xml | – sequence: 1 givenname: Jingbo orcidid: 0000-0002-6321-6293 surname: Zhou fullname: Zhou, Jingbo email: zhou.2955@osu.edu organization: Department of Electrical & Computer Engineering, The Ohio State University, Columbus, OH, USA – sequence: 2 givenname: Xinmiao orcidid: 0000-0002-8289-2377 surname: Zhang fullname: Zhang, Xinmiao email: zhang.8952@osu.edu organization: Department of Electrical & Computer Engineering, The Ohio State University, Columbus, OH, USA |
BookMark | eNp9j8tKw0AUhgepYFt9AHHTF0icM5ckswzFXqAg2LgeJtOTMjYmkpmNPr0TWrpw4eJc-b9z-Gdk0vUdEvIINAWg6rnarvYpowxSTqViOdyQKUiZJVncTa498Dsy8_6DUiEgK6YkXWOHg2ndDx4W-7JKyhCMPSVv6J0PpguLXX90NmZ7ct3xntw2pvX4cKlz8r56qZabZPe63i7LXWJZJkMi6vigZpJahlxIYYQEjo3lhT3IvClqpAqQgqrjGGW1NIIry4pMxWCUz0l-vmuH3vsBG21dMMH1XRiMazVQPdrWo2092tYX25GEP-TX4D7N8P0v83RmHCJe9YpLAYrxXy1tYv4 |
CODEN | ITIFA6 |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3400624 crossref_primary_10_3390_electronics12224687 crossref_primary_10_3390_electronics11233906 crossref_primary_10_1109_TCAD_2022_3175051 crossref_primary_10_1109_TIFS_2022_3207361 crossref_primary_10_1109_TETC_2021_3108487 crossref_primary_10_1109_TCAD_2023_3240933 crossref_primary_10_1109_TIFS_2022_3149147 crossref_primary_10_1109_TCAD_2023_3282897 crossref_primary_10_1109_TVLSI_2023_3340350 |
Cites_doi | 10.1109/TIFS.2019.2904838 10.1109/ASPDAC.2015.7059112 10.1007/978-3-319-66787-4_10 10.1109/TCAD.2018.2801220 10.23919/DATE.2018.8342086 10.1109/TIFS.2018.2850319 10.1109/LATW.2015.7102410 10.46586/tches.v2020.i1.175-202 10.1109/TCAD.2015.2511144 10.23919/DATE.2019.8715163 10.1145/2508859.2516656 10.1109/TC.2013.193 10.1109/ICCAD.2014.7001362 10.1145/1403375.1403631 10.1145/3133956.3133985 10.1145/2024724.2024805 10.1109/TETC.2017.2740364 10.1109/HST.2016.7495588 10.1145/2228360.2228377 10.1109/JPROC.2014.2335155 10.1109/HST.2015.7140252 10.1109/JPROC.2014.2332291 10.1109/ASPDAC.2018.8297317 10.1145/2593069.2602554 |
ContentType | Journal Article |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/TIFS.2021.3059271 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1556-6021 |
EndPage | 2592 |
ExternalDocumentID | 10_1109_TIFS_2021_3059271 9354192 |
Genre | orig-research |
GrantInformation_xml | – fundername: U.S. Air Force Research Laboratory grantid: FA8650-20-C-1719 funderid: 10.13039/100006602 |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION RIG |
ID | FETCH-LOGICAL-c265t-4b004b250c2e3454a4513efc38cd57f8be091e019bd57250b5a439c2869286203 |
IEDL.DBID | RIE |
ISSN | 1556-6013 |
IngestDate | Thu Apr 24 23:11:51 EDT 2025 Tue Jul 01 02:34:16 EDT 2025 Wed Aug 27 02:44:04 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c265t-4b004b250c2e3454a4513efc38cd57f8be091e019bd57250b5a439c2869286203 |
ORCID | 0000-0002-8289-2377 0000-0002-6321-6293 |
PageCount | 12 |
ParticipantIDs | ieee_primary_9354192 crossref_citationtrail_10_1109_TIFS_2021_3059271 crossref_primary_10_1109_TIFS_2021_3059271 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20210000 2021-00-00 |
PublicationDateYYYYMMDD | 2021-01-01 |
PublicationDate_xml | – year: 2021 text: 20210000 |
PublicationDecade | 2020 |
PublicationTitle | IEEE transactions on information forensics and security |
PublicationTitleAbbrev | TIFS |
PublicationYear | 2021 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | ref12 ref15 ref14 ref11 ref10 ref2 ref1 ref17 ref16 ref19 ref18 bicky (ref29) 2020; 2020 ref24 ref23 ref25 sengupta (ref28) 2019; 2019 ref22 ref21 liu (ref13) 2014 ref27 ref8 (ref26) 2021 ref7 ref9 ref4 ref3 ref6 ref5 zhou (ref20) 2017; 2017 |
References_xml | – ident: ref24 doi: 10.1109/TIFS.2019.2904838 – ident: ref12 doi: 10.1109/ASPDAC.2015.7059112 – ident: ref27 doi: 10.1007/978-3-319-66787-4_10 – ident: ref15 doi: 10.1109/TCAD.2018.2801220 – ident: ref19 doi: 10.23919/DATE.2018.8342086 – volume: 2017 start-page: 696 year: 2017 ident: ref20 article-title: A humble theory and application for logic encryption publication-title: IACR Cryptol ePrint Arch – volume: 2019 start-page: 1443 year: 2019 ident: ref28 article-title: CAS-unlock: Unlocking CAS-lock without access to a reverse-engineered netlist publication-title: IACR Cryptol ePrint Arch – ident: ref17 doi: 10.1109/TIFS.2018.2850319 – ident: ref11 doi: 10.1109/LATW.2015.7102410 – ident: ref25 doi: 10.46586/tches.v2020.i1.175-202 – ident: ref8 doi: 10.1109/TCAD.2015.2511144 – ident: ref23 doi: 10.23919/DATE.2019.8715163 – ident: ref4 doi: 10.1145/2508859.2516656 – ident: ref7 doi: 10.1109/TC.2013.193 – volume: 2020 start-page: 324 year: 2020 ident: ref29 article-title: Defeating CAS-unlock publication-title: IACR Cryptol ePrint Arch – ident: ref10 doi: 10.1109/ICCAD.2014.7001362 – ident: ref6 doi: 10.1145/1403375.1403631 – ident: ref21 doi: 10.1145/3133956.3133985 – year: 2021 ident: ref26 publication-title: Netlist Encryption and Obfuscation Suite – ident: ref5 doi: 10.1145/2024724.2024805 – ident: ref18 doi: 10.1109/TETC.2017.2740364 – ident: ref16 doi: 10.1109/HST.2016.7495588 – ident: ref9 doi: 10.1145/2228360.2228377 – ident: ref1 doi: 10.1109/JPROC.2014.2335155 – ident: ref14 doi: 10.1109/HST.2015.7140252 – ident: ref2 doi: 10.1109/JPROC.2014.2332291 – start-page: 1 year: 2014 ident: ref13 article-title: Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks publication-title: Proc Design Autom Test Eur Conf Exhibition (DATE) – ident: ref22 doi: 10.1109/ASPDAC.2018.8297317 – ident: ref3 doi: 10.1145/2593069.2602554 |
SSID | ssj0044168 |
Score | 2.384999 |
Snippet | Logic locking is used to protect integrated circuits (ICs) from piracy and counterfeiting. An encrypted IC implements the correct function only when the right... |
SourceID | crossref ieee |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 2581 |
SubjectTerms | Anti-SAT AppSAT attack Electronics packaging hardware security Integrated circuits Logic gates logic locking removal attack Resistance Resists Reverse engineering SAT attack Table lookup |
Title | Generalized SAT-Attack-Resistant Logic Locking |
URI | https://ieeexplore.ieee.org/document/9354192 |
Volume | 16 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwED_mnvTB6aY4v-iDT2K6tkm65HGIYwrzwW2wt5JcU5BJJ9q97K83absxRcSHlrZcIOQuvfvd5e4AbliWxgopJyLkijCRSSIx1SQzqeaKWZirnB9y_ByPZuxpzucNuNvmwhhjysNnxnePZSw_XeLKucp6knIXtNyDPQvcqlytzV_XavUq7Y3zmFiQQesIZhjI3vRxOLFIMAp9K9wy6offdNBOU5VSpwxbMN7MpjpKsvBXhfZx_aNQ43-newSHtXHpDSppOIaGydvQ2jRu8Op93IaDnSqEHfDr0tOva5N6k8GUDIpC4YK8mE9nXOaF5xoyo72j86ufwGz4ML0fkbqNAsEo5gVhbmdqa-pgZCjjTDEeUpMhFZjyfia0sTaDsaaetq-WzPGISoxELO0VBfQUmvkyN2fgYSoCwVAYjYKFISqlpI5YjIynFir2uxBsFjbBusa4a3XxlpRYI5CJ40XieJHUvOjC7XbIe1Vg4y_ijlvmLWG9wue_f76AfTe4cphcQrP4WJkra0IU-rqUnS8XTMAT |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGOAAHHhuI8eyBEyJdH0mXHCfEtMHGgQ2JW5W4qYSGOgTdZb-epO2mgRDi0Kqt0iqynfqzHdsAVzRNIokhI9xnklCeCiIwUSTViWKSGjNXWj_k6DHqP9P7F_ZSg5tVLozWuth8pl17WcTykxnOrausLUJmg5YbsGn0PvPLbK3lf9fo9TLxjbGIGDMjrGKYvifak0FvbGzBwHeNeIug43_TQmttVQqt0tuD0XI-5WaSqTvPlYuLH6Ua_zvhfdit4KXTLeXhAGo6a8DesnWDU63kBuys1SFsglsVn35d6MQZdyekm-cSp-RJf1p4meWObcmM5ozWs34Iz727yW2fVI0UCAYRywm1a1MZsIOBDimjkjI_1CmGHBPWSbnSBjVoA_aUuTXDLJdCgQGPhDkCLzyCejbL9DE4mHCPU-RaIae-j1JKoQIaIWWJMRY7LfCWhI2xqjJum128xYW14YnY8iK2vIgrXrTgevXKe1li46_BTUvm1cCKwie_P76Erf5kNIyHg8eHU9i2HyrdJ2dQzz_m-twAilxdFHL0BU_0w1w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generalized+SAT-Attack-Resistant+Logic+Locking&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Zhou%2C+Jingbo&rft.au=Zhang%2C+Xinmiao&rft.date=2021&rft.pub=IEEE&rft.issn=1556-6013&rft.volume=16&rft.spage=2581&rft.epage=2592&rft_id=info:doi/10.1109%2FTIFS.2021.3059271&rft.externalDocID=9354192 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |