Generalized SAT-Attack-Resistant Logic Locking

Logic locking is used to protect integrated circuits (ICs) from piracy and counterfeiting. An encrypted IC implements the correct function only when the right key is input. Many existing logic-locking methods are subject to the powerful satisfiability (SAT)-based attack. Recently, an Anti-SAT scheme...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 16; pp. 2581 - 2592
Main Authors Zhou, Jingbo, Zhang, Xinmiao
Format Journal Article
LanguageEnglish
Published IEEE 2021
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Logic locking is used to protect integrated circuits (ICs) from piracy and counterfeiting. An encrypted IC implements the correct function only when the right key is input. Many existing logic-locking methods are subject to the powerful satisfiability (SAT)-based attack. Recently, an Anti-SAT scheme has been developed. By adopting two complementary logic blocks that consist of AND/NAND trees, it makes the number of iterations needed by the SAT attack exponential to the number of input bits. Nevertheless, the Anti-SAT scheme is vulnerable to the later AppSAT and removal attacks. This article proposes a generalized (G-)Anti-SAT scheme. Different from the Anti-SAT scheme, a variety of complementary or non-complementary functions can be adopted for the two blocks in our G-Anti-SAT scheme. The Anti-SAT scheme is just a special case of our proposed design. Our design can achieve higher output corruptibility, which is also tunable, so that better resistance to the AppSAT and removal attacks is achieved. Meanwhile, unlike existing AppSAT-resilient designs, our design does not sacrifice the resistance to the SAT attack.
AbstractList Logic locking is used to protect integrated circuits (ICs) from piracy and counterfeiting. An encrypted IC implements the correct function only when the right key is input. Many existing logic-locking methods are subject to the powerful satisfiability (SAT)-based attack. Recently, an Anti-SAT scheme has been developed. By adopting two complementary logic blocks that consist of AND/NAND trees, it makes the number of iterations needed by the SAT attack exponential to the number of input bits. Nevertheless, the Anti-SAT scheme is vulnerable to the later AppSAT and removal attacks. This article proposes a generalized (G-)Anti-SAT scheme. Different from the Anti-SAT scheme, a variety of complementary or non-complementary functions can be adopted for the two blocks in our G-Anti-SAT scheme. The Anti-SAT scheme is just a special case of our proposed design. Our design can achieve higher output corruptibility, which is also tunable, so that better resistance to the AppSAT and removal attacks is achieved. Meanwhile, unlike existing AppSAT-resilient designs, our design does not sacrifice the resistance to the SAT attack.
Author Zhang, Xinmiao
Zhou, Jingbo
Author_xml – sequence: 1
  givenname: Jingbo
  orcidid: 0000-0002-6321-6293
  surname: Zhou
  fullname: Zhou, Jingbo
  email: zhou.2955@osu.edu
  organization: Department of Electrical & Computer Engineering, The Ohio State University, Columbus, OH, USA
– sequence: 2
  givenname: Xinmiao
  orcidid: 0000-0002-8289-2377
  surname: Zhang
  fullname: Zhang, Xinmiao
  email: zhang.8952@osu.edu
  organization: Department of Electrical & Computer Engineering, The Ohio State University, Columbus, OH, USA
BookMark eNp9j8tKw0AUhgepYFt9AHHTF0icM5ckswzFXqAg2LgeJtOTMjYmkpmNPr0TWrpw4eJc-b9z-Gdk0vUdEvIINAWg6rnarvYpowxSTqViOdyQKUiZJVncTa498Dsy8_6DUiEgK6YkXWOHg2ndDx4W-7JKyhCMPSVv6J0PpguLXX90NmZ7ct3xntw2pvX4cKlz8r56qZabZPe63i7LXWJZJkMi6vigZpJahlxIYYQEjo3lhT3IvClqpAqQgqrjGGW1NIIry4pMxWCUz0l-vmuH3vsBG21dMMH1XRiMazVQPdrWo2092tYX25GEP-TX4D7N8P0v83RmHCJe9YpLAYrxXy1tYv4
CODEN ITIFA6
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3400624
crossref_primary_10_3390_electronics12224687
crossref_primary_10_3390_electronics11233906
crossref_primary_10_1109_TCAD_2022_3175051
crossref_primary_10_1109_TIFS_2022_3207361
crossref_primary_10_1109_TETC_2021_3108487
crossref_primary_10_1109_TCAD_2023_3240933
crossref_primary_10_1109_TIFS_2022_3149147
crossref_primary_10_1109_TCAD_2023_3282897
crossref_primary_10_1109_TVLSI_2023_3340350
Cites_doi 10.1109/TIFS.2019.2904838
10.1109/ASPDAC.2015.7059112
10.1007/978-3-319-66787-4_10
10.1109/TCAD.2018.2801220
10.23919/DATE.2018.8342086
10.1109/TIFS.2018.2850319
10.1109/LATW.2015.7102410
10.46586/tches.v2020.i1.175-202
10.1109/TCAD.2015.2511144
10.23919/DATE.2019.8715163
10.1145/2508859.2516656
10.1109/TC.2013.193
10.1109/ICCAD.2014.7001362
10.1145/1403375.1403631
10.1145/3133956.3133985
10.1145/2024724.2024805
10.1109/TETC.2017.2740364
10.1109/HST.2016.7495588
10.1145/2228360.2228377
10.1109/JPROC.2014.2335155
10.1109/HST.2015.7140252
10.1109/JPROC.2014.2332291
10.1109/ASPDAC.2018.8297317
10.1145/2593069.2602554
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TIFS.2021.3059271
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 2592
ExternalDocumentID 10_1109_TIFS_2021_3059271
9354192
Genre orig-research
GrantInformation_xml – fundername: U.S. Air Force Research Laboratory
  grantid: FA8650-20-C-1719
  funderid: 10.13039/100006602
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
ID FETCH-LOGICAL-c265t-4b004b250c2e3454a4513efc38cd57f8be091e019bd57250b5a439c2869286203
IEDL.DBID RIE
ISSN 1556-6013
IngestDate Thu Apr 24 23:11:51 EDT 2025
Tue Jul 01 02:34:16 EDT 2025
Wed Aug 27 02:44:04 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c265t-4b004b250c2e3454a4513efc38cd57f8be091e019bd57250b5a439c2869286203
ORCID 0000-0002-8289-2377
0000-0002-6321-6293
PageCount 12
ParticipantIDs ieee_primary_9354192
crossref_citationtrail_10_1109_TIFS_2021_3059271
crossref_primary_10_1109_TIFS_2021_3059271
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210000
2021-00-00
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – year: 2021
  text: 20210000
PublicationDecade 2020
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
References ref12
ref15
ref14
ref11
ref10
ref2
ref1
ref17
ref16
ref19
ref18
bicky (ref29) 2020; 2020
ref24
ref23
ref25
sengupta (ref28) 2019; 2019
ref22
ref21
liu (ref13) 2014
ref27
ref8
(ref26) 2021
ref7
ref9
ref4
ref3
ref6
ref5
zhou (ref20) 2017; 2017
References_xml – ident: ref24
  doi: 10.1109/TIFS.2019.2904838
– ident: ref12
  doi: 10.1109/ASPDAC.2015.7059112
– ident: ref27
  doi: 10.1007/978-3-319-66787-4_10
– ident: ref15
  doi: 10.1109/TCAD.2018.2801220
– ident: ref19
  doi: 10.23919/DATE.2018.8342086
– volume: 2017
  start-page: 696
  year: 2017
  ident: ref20
  article-title: A humble theory and application for logic encryption
  publication-title: IACR Cryptol ePrint Arch
– volume: 2019
  start-page: 1443
  year: 2019
  ident: ref28
  article-title: CAS-unlock: Unlocking CAS-lock without access to a reverse-engineered netlist
  publication-title: IACR Cryptol ePrint Arch
– ident: ref17
  doi: 10.1109/TIFS.2018.2850319
– ident: ref11
  doi: 10.1109/LATW.2015.7102410
– ident: ref25
  doi: 10.46586/tches.v2020.i1.175-202
– ident: ref8
  doi: 10.1109/TCAD.2015.2511144
– ident: ref23
  doi: 10.23919/DATE.2019.8715163
– ident: ref4
  doi: 10.1145/2508859.2516656
– ident: ref7
  doi: 10.1109/TC.2013.193
– volume: 2020
  start-page: 324
  year: 2020
  ident: ref29
  article-title: Defeating CAS-unlock
  publication-title: IACR Cryptol ePrint Arch
– ident: ref10
  doi: 10.1109/ICCAD.2014.7001362
– ident: ref6
  doi: 10.1145/1403375.1403631
– ident: ref21
  doi: 10.1145/3133956.3133985
– year: 2021
  ident: ref26
  publication-title: Netlist Encryption and Obfuscation Suite
– ident: ref5
  doi: 10.1145/2024724.2024805
– ident: ref18
  doi: 10.1109/TETC.2017.2740364
– ident: ref16
  doi: 10.1109/HST.2016.7495588
– ident: ref9
  doi: 10.1145/2228360.2228377
– ident: ref1
  doi: 10.1109/JPROC.2014.2335155
– ident: ref14
  doi: 10.1109/HST.2015.7140252
– ident: ref2
  doi: 10.1109/JPROC.2014.2332291
– start-page: 1
  year: 2014
  ident: ref13
  article-title: Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks
  publication-title: Proc Design Autom Test Eur Conf Exhibition (DATE)
– ident: ref22
  doi: 10.1109/ASPDAC.2018.8297317
– ident: ref3
  doi: 10.1145/2593069.2602554
SSID ssj0044168
Score 2.384999
Snippet Logic locking is used to protect integrated circuits (ICs) from piracy and counterfeiting. An encrypted IC implements the correct function only when the right...
SourceID crossref
ieee
SourceType Enrichment Source
Index Database
Publisher
StartPage 2581
SubjectTerms Anti-SAT
AppSAT attack
Electronics packaging
hardware security
Integrated circuits
Logic gates
logic locking
removal attack
Resistance
Resists
Reverse engineering
SAT attack
Table lookup
Title Generalized SAT-Attack-Resistant Logic Locking
URI https://ieeexplore.ieee.org/document/9354192
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwED_mnvTB6aY4v-iDT2K6tkm65HGIYwrzwW2wt5JcU5BJJ9q97K83absxRcSHlrZcIOQuvfvd5e4AbliWxgopJyLkijCRSSIx1SQzqeaKWZirnB9y_ByPZuxpzucNuNvmwhhjysNnxnePZSw_XeLKucp6knIXtNyDPQvcqlytzV_XavUq7Y3zmFiQQesIZhjI3vRxOLFIMAp9K9wy6offdNBOU5VSpwxbMN7MpjpKsvBXhfZx_aNQ43-newSHtXHpDSppOIaGydvQ2jRu8Op93IaDnSqEHfDr0tOva5N6k8GUDIpC4YK8mE9nXOaF5xoyo72j86ufwGz4ML0fkbqNAsEo5gVhbmdqa-pgZCjjTDEeUpMhFZjyfia0sTaDsaaetq-WzPGISoxELO0VBfQUmvkyN2fgYSoCwVAYjYKFISqlpI5YjIynFir2uxBsFjbBusa4a3XxlpRYI5CJ40XieJHUvOjC7XbIe1Vg4y_ijlvmLWG9wue_f76AfTe4cphcQrP4WJkra0IU-rqUnS8XTMAT
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGOAAHHhuI8eyBEyJdH0mXHCfEtMHGgQ2JW5W4qYSGOgTdZb-epO2mgRDi0Kqt0iqynfqzHdsAVzRNIokhI9xnklCeCiIwUSTViWKSGjNXWj_k6DHqP9P7F_ZSg5tVLozWuth8pl17WcTykxnOrausLUJmg5YbsGn0PvPLbK3lf9fo9TLxjbGIGDMjrGKYvifak0FvbGzBwHeNeIug43_TQmttVQqt0tuD0XI-5WaSqTvPlYuLH6Ua_zvhfdit4KXTLeXhAGo6a8DesnWDU63kBuys1SFsglsVn35d6MQZdyekm-cSp-RJf1p4meWObcmM5ozWs34Iz727yW2fVI0UCAYRywm1a1MZsIOBDimjkjI_1CmGHBPWSbnSBjVoA_aUuTXDLJdCgQGPhDkCLzyCejbL9DE4mHCPU-RaIae-j1JKoQIaIWWJMRY7LfCWhI2xqjJum128xYW14YnY8iK2vIgrXrTgevXKe1li46_BTUvm1cCKwie_P76Erf5kNIyHg8eHU9i2HyrdJ2dQzz_m-twAilxdFHL0BU_0w1w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generalized+SAT-Attack-Resistant+Logic+Locking&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Zhou%2C+Jingbo&rft.au=Zhang%2C+Xinmiao&rft.date=2021&rft.pub=IEEE&rft.issn=1556-6013&rft.volume=16&rft.spage=2581&rft.epage=2592&rft_id=info:doi/10.1109%2FTIFS.2021.3059271&rft.externalDocID=9354192
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon