The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Penyulitan logik ialah teknik perlindungan IC yang memasukkan logik tambahan dan input utama untuk menyembunyikan kefungsian litar. Litar yang disulitkan perlu diaktifkan dengan kunci rahsia untuk berfungsi. Serangan SAT dan Serangan Pembuangan adalah dua kaedah penyahsulitan paling maju yang telah menunjukkan keberkesanannya untuk memecahkan kebanyakan kaedah penyulitan logik sedia ada dalam masa beberapa jam. Dalam kertas ini, kami mencadangkan SMARTLock, a SAT menyerang dan semulaMbujur Aserangan-Resistant Tlogik berasaskan ree Kuncikaedah, untuk menentangnya secara serentak. Untuk menyulitkan litar, kaedah mencari fungsi AND dan OR yang besar di dalamnya dan menyulitkannya dengan memasukkan fungsi pokok pendua. Terdapat dua jenis penyulitan pokok yang serupa secara struktur yang bertujuan untuk menahan serangan SAT dan serangan Pembuangan, masing-masing. Keputusan eksperimen menunjukkan bahawa kaedah yang dicadangkan adalah berkesan untuk menyulitkan set penanda aras daripada ISCAS'85, MCNC, dan IWLS. 16 daripada 40 penanda aras yang disulitkan oleh kaedah yang dicadangkan dengan overhed kawasan tidak lebih daripada 5% tidak boleh dipecahkan oleh serangan SAT dalam masa 5 jam. Selain itu, berbanding dengan kaedah penyulitan logik terkini, kaedah yang dicadangkan menyediakan keselamatan yang lebih baik untuk kebanyakan penanda aras.
Yung-Chih CHEN
Yuan Ze University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Yung-Chih CHEN, "SMARTLock: SAT Attack and Removal Attack-Resistant Tree-Based Logic Locking" in IEICE TRANSACTIONS on Fundamentals,
vol. E103-A, no. 5, pp. 733-740, May 2020, doi: 10.1587/transfun.2019EAP1055.
Abstract: Logic encryption is an IC protection technique which inserts extra logic and key inputs to hide a circuit's functionality. An encrypted circuit needs to be activated with a secret key for being functional. SAT attack and Removal attack are two most advanced decryption methods that have shown their effectiveness to break most of the existing logic encryption methods within a few hours. In this paper, we propose SMARTLock, a SAT attack and reMoval Attack-Resistant Tree-based logic Locking method, for resisting them simultaneously. To encrypt a circuit, the method finds large AND and OR functions in it and encrypts them by inserting duplicate tree functions. There are two types of structurally identical tree encryptions that aim to resist SAT attack and Removal attack, respectively. The experimental results show that the proposed method is effective for encrypting a set of benchmarks from ISCAS'85, MCNC, and IWLS. 16 out of 40 benchmarks encrypted by the proposed method with the area overhead of no more than 5% are uncrackable by SAT attack within 5 hours. Additionally, compared to the state-of-the-art logic encryption methods, the proposed method provides better security for most benchmarks.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2019EAP1055/_p
Salinan
@ARTICLE{e103-a_5_733,
author={Yung-Chih CHEN, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={SMARTLock: SAT Attack and Removal Attack-Resistant Tree-Based Logic Locking},
year={2020},
volume={E103-A},
number={5},
pages={733-740},
abstract={Logic encryption is an IC protection technique which inserts extra logic and key inputs to hide a circuit's functionality. An encrypted circuit needs to be activated with a secret key for being functional. SAT attack and Removal attack are two most advanced decryption methods that have shown their effectiveness to break most of the existing logic encryption methods within a few hours. In this paper, we propose SMARTLock, a SAT attack and reMoval Attack-Resistant Tree-based logic Locking method, for resisting them simultaneously. To encrypt a circuit, the method finds large AND and OR functions in it and encrypts them by inserting duplicate tree functions. There are two types of structurally identical tree encryptions that aim to resist SAT attack and Removal attack, respectively. The experimental results show that the proposed method is effective for encrypting a set of benchmarks from ISCAS'85, MCNC, and IWLS. 16 out of 40 benchmarks encrypted by the proposed method with the area overhead of no more than 5% are uncrackable by SAT attack within 5 hours. Additionally, compared to the state-of-the-art logic encryption methods, the proposed method provides better security for most benchmarks.},
keywords={},
doi={10.1587/transfun.2019EAP1055},
ISSN={1745-1337},
month={May},}
Salinan
TY - JOUR
TI - SMARTLock: SAT Attack and Removal Attack-Resistant Tree-Based Logic Locking
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 733
EP - 740
AU - Yung-Chih CHEN
PY - 2020
DO - 10.1587/transfun.2019EAP1055
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E103-A
IS - 5
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - May 2020
AB - Logic encryption is an IC protection technique which inserts extra logic and key inputs to hide a circuit's functionality. An encrypted circuit needs to be activated with a secret key for being functional. SAT attack and Removal attack are two most advanced decryption methods that have shown their effectiveness to break most of the existing logic encryption methods within a few hours. In this paper, we propose SMARTLock, a SAT attack and reMoval Attack-Resistant Tree-based logic Locking method, for resisting them simultaneously. To encrypt a circuit, the method finds large AND and OR functions in it and encrypts them by inserting duplicate tree functions. There are two types of structurally identical tree encryptions that aim to resist SAT attack and Removal attack, respectively. The experimental results show that the proposed method is effective for encrypting a set of benchmarks from ISCAS'85, MCNC, and IWLS. 16 out of 40 benchmarks encrypted by the proposed method with the area overhead of no more than 5% are uncrackable by SAT attack within 5 hours. Additionally, compared to the state-of-the-art logic encryption methods, the proposed method provides better security for most benchmarks.
ER -