2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2021
DOI: 10.1109/isvlsi51109.2021.00031
|View full text |Cite
|
Sign up to set email alerts
|

On Preventing SAT Attack with Decoy Key-Inputs

Abstract: The globalized supply chain in the semiconductor industry raises several security concerns such as IC overproduction, intellectual property piracy and design tampering. Logic locking has emerged as a Design-for-Trust countermeasure to address these issues. Original logic locking proposals provide a high degree of output corruption -i.e., errors on circuit outputsunless it is unlocked with the correct key. This is a prerequisite for making a manufactured circuit unusable without the designer's intervention. Sin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Moreover, these multiplier blocks under an architecture including a multiplier are locked by prominent logic locking methods, namely, RLL [28] and the SAT-resilient methods of AntiSAT [33], SARLock [32], SFLL [23], CASLock [34], and SKGLock [36]. In this case, the multiplier block described at RTL is initially synthesized and its gate-level netlist is obtained, and then, this netlist is locked.…”
Section: A Results Of Obfuscated and Locked Multiplier Blocksmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, these multiplier blocks under an architecture including a multiplier are locked by prominent logic locking methods, namely, RLL [28] and the SAT-resilient methods of AntiSAT [33], SARLock [32], SFLL [23], CASLock [34], and SKGLock [36]. In this case, the multiplier block described at RTL is initially synthesized and its gate-level netlist is obtained, and then, this netlist is locked.…”
Section: A Results Of Obfuscated and Locked Multiplier Blocksmentioning
confidence: 99%
“…However, the satisfiability (SAT)-based attack [31] overcame all the defenses existing at that time. To thwart the SAT-based attack and its variants, circuits have been locked using a point function that forces these attacks to explore an exponential number of queries [23], [32]- [36]. Moreover, the obfuscation of a locked design is considered in [37].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In line with proposals based on improved point-function structures, which aim at increasing output corruption, we have proposed SK-Lock in [24]. SKG-Lock+ improves on this version, as will be detailed in this section.…”
Section: Proposed Logic Locking Scheme: Skg-lock+mentioning
confidence: 99%
“…This research has also been coupled with improvements in attacks, mimicking an extremely prolific cat and mouse game, which motivates all the more the proposal of new protection methods, while making this task even more challenging. To address the limitations of previous schemes, we proposed SKG-Lock [24], featuring the characteristics of causing corruption at multiple signals with different corruptibilities. In this paper, we present SKG-Lock+, which also provides high security against attacks while further improving corruption.…”
Section: Introductionmentioning
confidence: 99%