Cargando…

A critical view on the real-world security of logic locking

With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and sub...

Descripción completa

Detalles Bibliográficos
Autores principales: Engels, Susanne, Hoffmann, Max, Paar, Christof
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9464179/
https://www.ncbi.nlm.nih.gov/pubmed/36105519
http://dx.doi.org/10.1007/s13389-022-00294-x
_version_ 1784787526351847424
author Engels, Susanne
Hoffmann, Max
Paar, Christof
author_facet Engels, Susanne
Hoffmann, Max
Paar, Christof
author_sort Engels, Susanne
collection PubMed
description With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is logic locking, where the genuine functionality of a chip is “locked” using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction—a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction.
format Online
Article
Text
id pubmed-9464179
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-94641792022-09-12 A critical view on the real-world security of logic locking Engels, Susanne Hoffmann, Max Paar, Christof J Cryptogr Eng Regular Paper With continuously shrinking feature sizes of integrated circuits, the vast majority of semiconductor companies have become fabless, outsourcing to foundries across the globe. This exposes the design industry to a number of threats, including piracy via IP-theft or unauthorized overproduction and subsequent reselling on the black market. One alleged solution for this problem is logic locking, where the genuine functionality of a chip is “locked” using a key only known to the designer. Solely with a correct key, the design works as intended. Since unlocking is handled by the designer only after production, an adversary in the supply chain should not be able to unlock overproduced chips. In this work, we focus on logic locking against the threat of overproduction. First, we survey existing locking schemes and characterize them by their handling of keys, before extracting similarities and differences in the employed attacker models. We then compare said models to the real-world capabilities of the primary adversary in overproduction—a malicious foundry. This comparison allows us to identify pitfalls in existing models and derive a more realistic attacker model. Then, we discuss how existing schemes hold up against the new attacker model. Our discussion highlights that several attacks beyond the usually employed SAT-based approaches are viable. Crucially, these attacks stem from the underlying structure of current logic locking approaches, which has never changed since its introduction in 2008. We conclude that logic locking, while being a promising approach, needs a fundamental rethinking to achieve real-world protection against overproduction. Springer Berlin Heidelberg 2022-08-20 2022 /pmc/articles/PMC9464179/ /pubmed/36105519 http://dx.doi.org/10.1007/s13389-022-00294-x Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Regular Paper
Engels, Susanne
Hoffmann, Max
Paar, Christof
A critical view on the real-world security of logic locking
title A critical view on the real-world security of logic locking
title_full A critical view on the real-world security of logic locking
title_fullStr A critical view on the real-world security of logic locking
title_full_unstemmed A critical view on the real-world security of logic locking
title_short A critical view on the real-world security of logic locking
title_sort critical view on the real-world security of logic locking
topic Regular Paper
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9464179/
https://www.ncbi.nlm.nih.gov/pubmed/36105519
http://dx.doi.org/10.1007/s13389-022-00294-x
work_keys_str_mv AT engelssusanne acriticalviewontherealworldsecurityoflogiclocking
AT hoffmannmax acriticalviewontherealworldsecurityoflogiclocking
AT paarchristof acriticalviewontherealworldsecurityoflogiclocking
AT engelssusanne criticalviewontherealworldsecurityoflogiclocking
AT hoffmannmax criticalviewontherealworldsecurityoflogiclocking
AT paarchristof criticalviewontherealworldsecurityoflogiclocking