22 research outputs found
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against
hardware-level threats such as IP piracy, overbuilding, and insertion of
hardware Trojans. Nevertheless, the security promise of split manufacturing has
been challenged by various attacks, which exploit the well-known working
principles of physical design tools to infer the missing BEOL interconnects. In
this work, we advocate a new paradigm to enhance the security for split
manufacturing. Based on Kerckhoff's principle, we protect the FEOL layout in a
formal and secure manner, by embedding keys. These keys are purposefully
implemented and routed through the BEOL in such a way that they become
indecipherable to the state-of-the-art FEOL-centric attacks. We provide our
secure physical design flow to the community. We also define the security of
split manufacturing formally and provide the associated proofs. At the same
time, our technique is competitive with current schemes in terms of layout
overhead, especially for practical, large-scale designs (ITC'99 benchmarks).Comment: DATE 2019 (https://www.date-conference.com/conference/session/4.5
Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques
Split manufacturing is a promising technique to defend against fab-based
malicious activities such as IP piracy, overbuilding, and insertion of hardware
Trojans. However, a network flow-based proximity attack, proposed by Wang et
al. (DAC'16) [1], has demonstrated that most prior art on split manufacturing
is highly vulnerable. Here in this work, we present two practical layout
techniques towards secure split manufacturing: (i) gate-level graph coloring
and (ii) clustering of same-type gates. Our approach shows promising results
against the advanced proximity attack, lowering its success rate by 5.27x,
3.19x, and 1.73x on average compared to the unprotected layouts when splitting
at metal layers M1, M2, and M3, respectively. Also, it largely outperforms
previous defense efforts; we observe on average 8x higher resilience when
compared to representative prior art. At the same time, extensive simulations
on ISCAS'85 and MCNC benchmarks reveal that our techniques incur an acceptable
layout overhead. Apart from this empirical study, we provide---for the first
time---a theoretical framework for quantifying the layout-level resilience
against any proximity-induced information leakage. Towards this end, we
leverage the notion of mutual information and provide extensive results to
validate our model.Comment: Published in Proc. International Conference On Computer Aided Design
(ICCAD) 2017; [v2] minor fix Fig 11: avg area overhead for g-type2 was
miscalculated; [v3] added DOI to PDF foote
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist
CAS-Lock (cascaded locking) is a SAT-resilient locking technique, which can simultaneously thwart SAT and bypass attack, while maintaining non-trivial output corruptibility. Despite all of its theoretical guarantees, in this report we expose a serious flaw in its design that can be exploited to break CAS-Lock. Further, this attack neither requires access to a reverse-engineered netlist, nor it requires a working oracle with the correct key loaded onto the chip\u27s memory. We demonstrate that we can activate any CAS-Locked IC without knowing the secret key
Attacking Split Manufacturing from a Deep Learning Perspective
The notion of integrated circuit split manufacturing which delegates the
front-end-of-line (FEOL) and back-end-of-line (BEOL) parts to different
foundries, is to prevent overproduction, piracy of the intellectual property
(IP), or targeted insertion of hardware Trojans by adversaries in the FEOL
facility. In this work, we challenge the security promise of split
manufacturing by formulating various layout-level placement and routing hints
as vector- and image-based features. We construct a sophisticated deep neural
network which can infer the missing BEOL connections with high accuracy.
Compared with the publicly available network-flow attack [1], for the same set
of ISCAS-85 benchmarks, we achieve 1.21X accuracy when splitting on M1 and
1.12X accuracy when splitting on M3 with less than 1% running time
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miterbased Boolean satisfiability (SAT) attack that steered the research in the direction of developing SAT-resilient schemes. These schemes, however achieved SAT resilience at the cost of low output corruption. Recently, cascaded locking (CAS-Lock) [SXTF20a] was proposed that provides non-trivial output corruption all-the-while maintaining resilience to the SAT attack. Regardless of the theoretical properties, we revisit some of the assumptions made about its implementation, especially about security-unaware synthesis tools, and subsequently expose a set of structural vulnerabilities that can be exploited to break these schemes. We propose our attacks on baseline CAS-Lock as well as mirrored CAS (M-CAS), an improved version of CAS-Lock. We furnish extensive simulation results of our attacks on ISCAS’85 and ITC’99 benchmarks, where we show that CAS-Lock/M-CAS can be broken with ∼94% success rate. Further, we open-source all implementation scripts, locked circuits, and attack scripts for the community. Finally, we discuss the pitfalls of point function-based locking techniques including Anti-SAT [XS18] and Stripped Functionality Logic Locking(SFLL-HD) [YSN+17], which suffer from similar implementation issues.</jats:p
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miterbased Boolean satisfiability (SAT) attack that steered the research in the direction of developing SAT-resilient schemes. These schemes, however achieved SAT resilience at the cost of low output corruption. Recently, cascaded locking (CAS-Lock) [SXTF20a] was proposed that provides non-trivial output corruption all-the-while maintaining resilience to the SAT attack. Regardless of the theoretical properties, we revisit some of the assumptions made about its implementation, especially about security-unaware synthesis tools, and subsequently expose a set of structural vulnerabilities that can be exploited to break these schemes. We propose our attacks on baseline CAS-Lock as well as mirrored CAS (M-CAS), an improved version of CAS-Lock. We furnish extensive simulation results of our attacks on ISCAS’85 and ITC’99 benchmarks, where we show that CAS-Lock/M-CAS can be broken with ∼94% success rate. Further, we open-source all implementation scripts, locked circuits, and attack scripts for the community. Finally, we discuss the pitfalls of point function-based locking techniques including Anti-SAT [XS18] and Stripped Functionality Logic Locking(SFLL-HD) [YSN+17], which suffer from similar implementation issues
