首页> 外文会议>International Test Conference >Breaking Analog Locking Techniques via Satisfiability Modulo Theories
【24h】

Breaking Analog Locking Techniques via Satisfiability Modulo Theories

机译:通过满意度模理论突破模拟锁定技术

获取原文

摘要

Similar to digital circuits, analog circuits are also susceptible to supply-chain attacks, such as intellectual property (IP) piracy, counterfeiting, and overproduction. Hence, analog locking techniques have been proposed to combat supply-chain attacks. However, there exists no evaluation procedure to estimate the resilience offered by these defense techniques. Evaluating analog defense techniques requires the usage of non-Boolean variables, such as bias current, bias voltage, and gain. However, it cannot be handled by the Boolean satisfiability (SAT) attack. In this work, we propose an evaluation technique based on satisfiability modulo theories (SMT). We demonstrate our attack on four state-of-the-art analog locking techniques using commonly used circuits, such as bandpass filter (BPF), LC oscillator, quadrature oscillator, and class-D amplifiers. Our results show that the attacker, knowing the required bias current values, can determine the key in polynomial time. We also show that even if he/she has only partial information about the bias currents, the search space can be reduced from exponential to a polynomial number of keys. We then extend our attack to break existing analog camouflaging techniques.
机译:与数字电路类似,模拟电路也容易受到供应链攻击,例如知识产权(IP)盗版,伪造和生产过剩。因此,已经提出了模拟锁定技术来对抗供应链攻击。但是,没有评估程序来估计这些防御技术所提供的弹性。评估模拟防御技术需要使用非布尔变量,例如偏置电流,偏置电压和增益。但是,它不能通过布尔可满足性(SAT)攻击来处理。在这项工作中,我们提出了一种基于可满足性模理论(SMT)的评估技术。我们展示了使用常用电路(例如带通滤波器(BPF),LC振荡器,正交振荡器和D类放大器)对四种最新模拟锁定技术的攻击。我们的结果表明,攻击者知道所需的偏置电流值,就可以确定多项式时间的关键。我们还表明,即使他/她仅具有关于偏流的部分信息,也可以将搜索空间从指数键减少到多项式键。然后,我们扩大攻击范围,以打破现有的模拟伪装技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号