Breaking CAS-Lock and Its Variants by Exploiting Structural Traces

نویسندگان

چکیده

Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been decade-long cat-and-mouse game between defenses and attacks. A turning point in logic was the development of miterbased Boolean satisfiability (SAT) attack that steered research direction developing SAT-resilient schemes. These schemes, however achieved SAT resilience at cost low output corruption. Recently, cascaded (CAS-Lock) [SXTF20a] proposed provides non-trivial corruption all-the-while maintaining attack. Regardless theoretical properties, we revisit some assumptions made about its implementation, especially security-unaware synthesis tools, subsequently expose set structural vulnerabilities can be exploited break these We propose our attacks on baseline CAS-Lock as well mirrored CAS (M-CAS), an improved version CAS-Lock. furnish extensive simulation results ISCAS’85 ITC’99 benchmarks, where show CAS-Lock/M-CAS broken with ?94% success rate. Further, open-source all implementation scripts, locked circuits, scripts for community. Finally, discuss pitfalls function-based techniques including Anti-SAT [XS18] Stripped Functionality Locking(SFLL-HD) [YSN+17], which suffer from similar issues.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lock-Free Red-Black Trees Using CAS

The negative side-effects of using lock-based synchronization mechanisms are well known and include unexpected scheduling anomalies such as priority inversion and convoying as well as unnecessary synchronization overhead and the potential for deadlock. Despite these drawbacks, the use of lock-free techniques has not gained widespread acceptance. The reasons for this lack of acceptance include t...

متن کامل

Breaking Smart Card Implementations of ElGamal Signature and Its Variants

We suggest several methods that may allow one to com pletely break cryptosystems implemented in a portable hardware device such as a smart card These cryptanalytic methods work by exploring the hardware in such a way that the pseudo random number generator embedded in the device behaves predictably even for a very short period of time While these attacking methods will be discussed by standing ...

متن کامل

Exploiting Traces in Program Analysis

From operating systems and web browsers to spacecraft, many software systems maintain a log of events that provides a partial history of execution, supporting post-mortem (or post-reboot) analysis. Unfortunately, bandwidth, storage limitations, and privacy concerns limit the information content of logs, making it difficult to fully reconstruct execution from these traces. This paper presents a ...

متن کامل

House Lock and Structural Unemployment

A recent decline in geographic mobility in the United States may have been caused in part by falling house prices, through the “lock in” effects of financial constraints faced by households whose housing debt exceeds the market value of their home. I analyze the relationship between such “house lock” and the elevated levels and persistence of unemployment during the recent recession and its aft...

متن کامل

Expanding Paraphrase Lexicons by Exploiting Lexical Variants

This study tackles the problem of paraphrase acquisition: achieving high coverage as well as accuracy. Our method first induces paraphrase patterns from given seed paraphrases, exploiting the generality of paraphrases exhibited by pairs of lexical variants, e.g., “amendment” and “amending,” in a fully empirical way. It then searches monolingual corpora for new paraphrases that match the pattern...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2021

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2021.i3.418-440