...
首页> 外文期刊>Journal of Electronic Testing: Theory and Applications: Theory and Applications >Classical Cryptanalysis Attacks on Logic Locking Techniques
【24h】

Classical Cryptanalysis Attacks on Logic Locking Techniques

机译:逻辑锁定技术的古典密码分析攻击

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Logic locking is a protection technique for outsourced integrated circuit (IC) designs that thwarts IC piracy and IC counterfeiting by untrusted foundries. In this technique, the IC design house locks the correct functionality of the circuit using a key that is known only to the trusted entities in the design house. As the correct key values are provided by the design house after production, a malicious adversary in the foundry house will not be able to unlock overproduced or counterfeit ICs. In this paper, we mount linear approximation attacks and differential attacks on random logic locking (RLL), faultanalysis based logic locking (FLL), and strong logic locking (SLL) techniques. We present a formal approach to mount the linear approximation attack on multiple circuit partitions and thereafter combining the approximations to form the attack on a locked logic cone of the circuit. We present our results on ISCAS'85 benchmark circuits. In linear approximation attack, the combinatorial blocks are partitioned and expressed as linear expressions to derive a relation between the primary inputs and the primary outputs of the circuit. The attack aims to determine the linear approximation that has the highest probability of occurrence for the correct key input. In differential attacks, we could recover the embedded secret key in device with attack effort lesser than exhaustive search attack.
机译:逻辑锁定是外包集成电路(IC)设计的保护技术,其挫败盗版和IC由不可信任的成果伪造。在这种技术中,IC设计房屋使用仅在设计房屋中的可信实体已知的键锁定电路的正确功能。由于设计房屋在生产之后提供了正确的关键值,铸造厂的恶意对手将无法解锁过度发育或假冒IC。在本文中,我们在随机逻辑锁定(RLL),基于故障的逻辑锁定(FLL)和强逻辑锁定(SLL)技术上安装线性近似攻击和差异攻击。我们介绍了一种正式的方法来将线性近似攻击安装在多个电路分区上,然后组合近似以在电路的锁定逻辑锥上形成攻击。我们在ISCAS'85基准电路上展示了我们的结果。在线性近似攻击中,组合块被划分并且表示为线性表达式,以导出主输入和电路的主要输出之间的关系。攻击旨在确定具有最高概率的正确键输入的线性近似。在差异攻击中,我们可以通过攻击努力恢复嵌入式秘密密钥,比详尽的搜索攻击更小。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号