{"title":"A logic obfuscation attack method based on gate-level information flow tracing techniques","authors":"Liang Liu, Jiacheng Zhu, Zhe Zhang, Lixiang Shen, Yufeng Sun, Dejun Mu","doi":"10.1051/jnwpu/20244210078","DOIUrl":null,"url":null,"abstract":"Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effect and efficiency for benchmarks generated by five obfuscated encryption algorithms with two test area costs.","PeriodicalId":515230,"journal":{"name":"Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University","volume":"37 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1051/jnwpu/20244210078","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effect and efficiency for benchmarks generated by five obfuscated encryption algorithms with two test area costs.