论文标题

SAT攻击对逻辑锁定的复杂性分析

Complexity Analysis of the SAT Attack on Logic Locking

论文作者

Zhong, Yadi, Guin, Ujjwal

论文摘要

由于在半导体制造业全球化后采用了水平业务模型,综合电路(ICS)的生产过多和知识产权(IPS)的盗版可能会导致对半导体供应链完整性的重大损害。逻辑锁定是一种主要的设计措施,以应对这些威胁,在这种威胁中,只有在用秘密钥匙解锁时,IC才能完全发挥功能。但是,基于布尔的可满足性攻击使大多数锁定方案无效。这引起了许多防御和新的锁定方法,以实现SAT弹性。本文提供了基于SAT求解器中存储的Conjunctive Forman形式(CNF)的SAT攻击效率的独特视角。首先,我们展示了攻击如何使用区分输入模式和相应的Oracle响应在每次迭代中学习键之间的新关系。输入输出对会导致将新的CNF子句附加到SAT求解器上,从而导致不正确的钥匙值的指数减少。其次,我们证明SAT攻击可以打破关键大小的线性迭代复杂性中的任何锁定方案。此外,我们展示了点功能的关键约束如何影响SAT攻击复杂性。我们解释了为什么对AntISAT的适当关键约束有效地将复杂性降低至常数1。相同的约束有助于将Cas-Lock降低到线性迭代复杂性。我们的分析提供了有关SAT攻击对乘数基准C6288的能力的新观点,我们提供了实现SAT弹性的新方向。

Due to the adoption of horizontal business models following the globalization of semiconductor manufacturing, the overproduction of integrated circuits (ICs) and the piracy of intellectual properties (IPs) can lead to significant damage to the integrity of the semiconductor supply chain. Logic locking emerges as a primary design-for-security measure to counter these threats, where ICs become fully functional only when unlocked with a secret key. However, Boolean satisfiability-based attacks have rendered most locking schemes ineffective. This gives rise to numerous defenses and new locking methods to achieve SAT resiliency. This paper provides a unique perspective on the SAT attack efficiency based on conjunctive normal form (CNF) stored in SAT solver. First, we show how the attack learns new relations between keys in every iteration using distinguishing input patterns and the corresponding oracle responses. The input-output pairs result in new CNF clauses of unknown keys to be appended to the SAT solver, which leads to an exponential reduction in incorrect key values. Second, we demonstrate that the SAT attack can break any locking scheme within linear iteration complexity of key size. Moreover, we show how key constraints on point functions affect the SAT attack complexity. We explain why proper key constraint on AntiSAT reduces the complexity effectively to constant 1. The same constraint helps the breaking of CAS-Lock down to linear iteration complexity. Our analysis provides a new perspective on the capabilities of SAT attack against multiplier benchmark c6288, and we provide new directions to achieve SAT resiliency.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源