2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2020
DOI: 10.1109/host45689.2020.9300277
|View full text |Cite
|
Sign up to set email alerts
|

Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…Recommendations are also given on how to mitigate these two counter-attacks. The counter-attacks in [19], [20] are the most powerful since they are generally applicable to any biasing locking scheme, they cannot be mitigated, and also, compared to [17] where the attacker must derive circuit equations, are easier to execute even by a weak attacker with no particular circuit design expertise. The underlying idea is to remove the locked biasing circuit and replace it with an unlocked version of it and, thereafter, use optimization to synthesize the biasing circuit together with the circuit core.…”
Section: B Counter-attacks On Lockingmentioning
confidence: 99%
See 1 more Smart Citation
“…Recommendations are also given on how to mitigate these two counter-attacks. The counter-attacks in [19], [20] are the most powerful since they are generally applicable to any biasing locking scheme, they cannot be mitigated, and also, compared to [17] where the attacker must derive circuit equations, are easier to execute even by a weak attacker with no particular circuit design expertise. The underlying idea is to remove the locked biasing circuit and replace it with an unlocked version of it and, thereafter, use optimization to synthesize the biasing circuit together with the circuit core.…”
Section: B Counter-attacks On Lockingmentioning
confidence: 99%
“…In [19], the optimization aims at matching the frequency or transient response to that of the oracle, whereas in [20] the optimization aims at satisfying the performance tradeoff promised in the datasheet without requiring an oracle. In [19], a second optimization is performed aiming at recovering the secret key by using the extracted obfuscated component value as a second fitness criterion. In this way, the search in the large space of keys, i.e., 2 n where n is the key size, can converge in reasonable time.…”
Section: B Counter-attacks On Lockingmentioning
confidence: 99%
“…The defender may choose to make additional transistors tunable via their body-bias so as to increase the functionality corruption and security level if needed. The defender can Although a large key size is a prerequisite for defending against brute-force attacks, this locking scheme remains vulnerable against optimization-based attacks [22] which aim at searching in the key space towards optimizing the performance trade-off. More specifically, the attacker can formulate an optimization problem min key |f (key) − s| to approximate a "close" key, where f (key) is the function relating the performance with the key and s denotes the specification of the performance.…”
Section: A Locking Principlementioning
confidence: 99%
“…Therefore, the proposed locking thwarts IP/IC piracy. The key has a large size, which, combined with the long analog simulation time, thwarts counter-attacks to extract the key based on brute-force or optimization [22]. The non-linear DAC transformation further slows down the optimization convergence and, in addition, protects body-bias domains that are fixed to the reference voltages.…”
Section: Locking Propertiesmentioning
confidence: 99%
“…The function f j (key) is intricate without a known closed-form relationship and is computed by invoking a circuit simulator. Such an optimization attack based on a GA is proposed in [34] and was originally used for breaking biasing locking. For AMS ICs it is likely that a number of keys result in a satisfactory performance trade-off, although this number is typically a very small fraction of all keys.…”
Section: G Security Analysismentioning
confidence: 99%