...
首页> 外文期刊>Integration >Defense-in-depth: A recipe for logic locking to prevail
【24h】

Defense-in-depth: A recipe for logic locking to prevail

机译:纵深防御:普遍采用逻辑锁定的方法

获取原文
获取原文并翻译 | 示例
           

摘要

Logic locking/obfuscation has emerged as an auspicious solution for protecting the semiconductor intellectual property (IP) from the untrusted entities in the design and fabrication process. Logic locking disguises the implementation and functionality of the IP by implanting additional key-gates in the circuit. The right output of the locked chip is produced, once the correct key value is available at the input of the key-gates. The confidentiality of the key is imperative for the security of the locked IP as it stands as the lone barrier against IP infringement. Therefore, the logic locking is considered as a broken scheme once the key value is exposed. The logic locking techniques have shown vulnerability to different classes of attacks, such as Oracle-guided and physical attacks. Although the research community has proposed a number of countermeasures against such attacks, none of them is simultaneously unbreakable against Oracle-guided, Oracle-less, and physical attacks. Under such circumstances, a defense-in-depth mechanism can be considered as a feasible approach in addressing the vulnerabilities of logic locking. Defense-in-depth is a multilayer defense strategy where several independent countermeasures are implemented in the device to provide aggregated protection against different attack vectors.Introducing such a multilayer shielding model in logic locking is the major contribution of this paper. With regard to this, we first identify the core components of logic locking schemes, which need to be protected. Afterwards, we categorize the vulnerabilities of core components according to potential threats for the locking key in logic locking schemes. Furthermore, we propose several defense layers and countermeasures to protect the device from those vulnerabilities. In conclusion, we believe that a logic locking technique with a layered defense mechanism can be a possible solution against IP piracy.
机译:逻辑锁定/混淆已成为一种吉祥的解决方案,用于在设计和制造过程中保护半导体知识产权(IP)不受不受信任的实体的侵害。逻辑锁定通过在电路中植入其他按键门来掩盖IP的实现和功能。一旦在按键门的输入端获得正确的按键值,就会产生锁定芯片的正确输出。密钥的机密性对于锁定的IP的安全性至关重要,因为它是防止IP侵权的唯一障碍。因此,一旦键值被暴露,逻辑锁定就被认为是一个坏方案。逻辑锁定技术已显示出对不同类型攻击的脆弱性,例如Oracle引导的攻击和物理攻击。尽管研究团体已经提出了许多针对此类攻击的对策,但它们都无法同时抵御Oracle引导的,无Oracle的和物理的攻击。在这种情况下,可以将纵深防御机制视为解决逻辑锁定漏洞的可行方法。深度防御是一种多层防御策略,其中在设备中实施了几种独立的对策,以针对不同的攻击媒介提供汇总保护。在逻辑锁定中引入这种多层屏蔽模型是本文的主要贡献。关于这一点,我们首先确定逻辑锁定方案的核心组件,这些组件需要加以保护。然后,我们根据逻辑锁定方案中锁定密钥的潜在威胁对核心组件的漏洞进行了分类。此外,我们提出了几个防御层和对策,以保护设备免受这些漏洞的侵害。总而言之,我们相信具有分层防御机制的逻辑锁定技术可能是针对IP盗版的一种可能的解决方案。

著录项

  • 来源
    《Integration》 |2020年第5期|39-57|共19页
  • 作者

  • 作者单位

    Univ Florida Florida Inst Cybersecur FICS Res Elect & Comp Engn Dept Gainesville FL 32611 USA;

    Ohio State Univ Elect & Comp Engn Dept Columbus OH 43210 USA;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Logic obfuscation; Tamper-proof memory; Scan chain; Oracle-guided attack; Physical attack;

    机译:逻辑混淆;防篡改的内存;扫描链;Oracle引导的攻击;身体攻击;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号