Cargando…
A critical view on the real-world security of logic locking
With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and sub...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Berlin Heidelberg
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9464179/ https://www.ncbi.nlm.nih.gov/pubmed/36105519 http://dx.doi.org/10.1007/s13389-022-00294-x |
_version_ | 1784787526351847424 |
---|---|
author | Engels, Susanne Hoffmann, Max Paar, Christof |
author_facet | Engels, Susanne Hoffmann, Max Paar, Christof |
author_sort | Engels, Susanne |
collection | PubMed |
description | With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is logic locking, where the genuine functionality of a chip is “locked” using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction—a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction. |
format | Online Article Text |
id | pubmed-9464179 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer Berlin Heidelberg |
record_format | MEDLINE/PubMed |
spelling | pubmed-94641792022-09-12 A critical view on the real-world security of logic locking Engels, Susanne Hoffmann, Max Paar, Christof J Cryptogr Eng Regular Paper With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is logic locking, where the genuine functionality of a chip is “locked” using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction—a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction. Springer Berlin Heidelberg 2022-08-20 2022 /pmc/articles/PMC9464179/ /pubmed/36105519 http://dx.doi.org/10.1007/s13389-022-00294-x Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Regular Paper Engels, Susanne Hoffmann, Max Paar, Christof A critical view on the real-world security of logic locking |
title | A critical view on the real-world security of logic locking |
title_full | A critical view on the real-world security of logic locking |
title_fullStr | A critical view on the real-world security of logic locking |
title_full_unstemmed | A critical view on the real-world security of logic locking |
title_short | A critical view on the real-world security of logic locking |
title_sort | critical view on the real-world security of logic locking |
topic | Regular Paper |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9464179/ https://www.ncbi.nlm.nih.gov/pubmed/36105519 http://dx.doi.org/10.1007/s13389-022-00294-x |
work_keys_str_mv | AT engelssusanne acriticalviewontherealworldsecurityoflogiclocking AT hoffmannmax acriticalviewontherealworldsecurityoflogiclocking AT paarchristof acriticalviewontherealworldsecurityoflogiclocking AT engelssusanne criticalviewontherealworldsecurityoflogiclocking AT hoffmannmax criticalviewontherealworldsecurityoflogiclocking AT paarchristof criticalviewontherealworldsecurityoflogiclocking |