Proceedings of the 26th Asia and South Pacific Design Automation Conference 2021
DOI: 10.1145/3394885.3431603
|View full text |Cite
|
Sign up to set email alerts
|

Breaking Analog Biasing Locking Techniques via Re-Synthesis

Abstract: We demonstrate an attack to break all analog circuit locking techniques that act upon the biasing of the circuit. The attack is based on re-synthesizing the biasing circuits and requires only the use of an optimization algorithm. It is generally applicable to any analog circuit class. For the attacker the method requires no in-depth understanding or analysis of the circuit. The attack is demonstrated on a bias-locked Low-Dropout (LDO) regulator. As the underlying optimization algorithm we employ a Genetic Algo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…The majority of them target biasing locking [17]- [20]. The counter-attack in [17] is demonstrated to break all existing biasing locking techniques.…”
Section: B Counter-attacks On Lockingmentioning
confidence: 99%
See 3 more Smart Citations
“…The majority of them target biasing locking [17]- [20]. The counter-attack in [17] is demonstrated to break all existing biasing locking techniques.…”
Section: B Counter-attacks On Lockingmentioning
confidence: 99%
“…Recommendations are also given on how to mitigate these two counter-attacks. The counter-attacks in [19], [20] are the most powerful since they are generally applicable to any biasing locking scheme, they cannot be mitigated, and also, compared to [17] where the attacker must derive circuit equations, are easier to execute even by a weak attacker with no particular circuit design expertise. The underlying idea is to remove the locked biasing circuit and replace it with an unlocked version of it and, thereafter, use optimization to synthesize the biasing circuit together with the circuit core.…”
Section: B Counter-attacks On Lockingmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, counter-attacks were proposed recently that break biasing locking allowing the attacker to recover the secret key or to remove the lock by re-synthesizing the biasing circuit [32]- [35].…”
Section: Prior Art In Locking Ams Icsmentioning
confidence: 99%