2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2021
DOI: 10.1109/host49136.2021.9702267
|View full text |Cite
|
Sign up to set email alerts
|

Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…In this step, for complex cases that are hard to distinguish between original and extra states, some random stimuli can be matched with the oracle. More recent studies on FSM obfuscation show how even implicit external secrecy (keyless) can be modeled using I/O query-based attacks [29,41]. In RANE [41], the secret(s) of HARPOON, which are S N init , I en , and I auth (Fig.…”
Section: E Existing Attacks On Fsm Lockingmentioning
confidence: 99%
See 4 more Smart Citations
“…In this step, for complex cases that are hard to distinguish between original and extra states, some random stimuli can be matched with the oracle. More recent studies on FSM obfuscation show how even implicit external secrecy (keyless) can be modeled using I/O query-based attacks [29,41]. In RANE [41], the secret(s) of HARPOON, which are S N init , I en , and I auth (Fig.…”
Section: E Existing Attacks On Fsm Lockingmentioning
confidence: 99%
“…Structural analysis-based attacks [12][13][14] on point function techniques [15][16][17][18], attacks relying on machine learning [19,20] on routing-based techniques [21][22][23], and theory-based SAT attacks [24,25] on non-Boolean logic locking [26,27] are some of the evident examples showing the concerning state of the logic locking. [28], Fun-SAT [29], [30] states prior the original FSM connected to the original part of FSM Structural [31] Interlocking [32] Augments orignial FSM with obfuscation mode and code-word Code-word doesn't impact output function Fun-SAT [29], Structural [31] State [33] Verifies enabling key at each state and Obfuscated states are loosely connected Structural [31] Deflection deflects to black holes to the orignial part of FSM…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations