{"title":"利用逻辑锁定技术开发Y86处理器的攻击弹性","authors":"Roshan E., Nishanth VG., M. N.","doi":"10.1109/iemcon53756.2021.9623118","DOIUrl":null,"url":null,"abstract":"The majority of processors and ICs on the market today are susceptible to intellectual property theft and hardware trojan insertion. This is a significant security risk for both the manufacturer and the end user. Logic Locking is a prevalent method for tackling such problems. In Logic locking, the designer performs minor architectural modifications in the design to conceal the functionality from any malicious parties. In this paper, we have analyzed logic locking schemes like Encrypt Flip-Flop and D-MUX. These schemes have been used to encrypt a Y86-64 processor and the encrypted design was synthesized to obtain a locked netlist. To further enhance the security, a key generation module was added to the design. The key parameters such as resource utilization and hamming distance were compared for all the cases. ML-based logic locking attacks are emerging techniques for efficient key retrieval. Some of the ML-based attacks from both oracle-less and oracle-guided classes were analyzed in this study. One of the attacks which was discussed called SWEEP was implemented and tested on all the implemented encrypted designs.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Developing Attack Resilience in Y86 Processor using Logic Locking\",\"authors\":\"Roshan E., Nishanth VG., M. N.\",\"doi\":\"10.1109/iemcon53756.2021.9623118\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The majority of processors and ICs on the market today are susceptible to intellectual property theft and hardware trojan insertion. This is a significant security risk for both the manufacturer and the end user. Logic Locking is a prevalent method for tackling such problems. In Logic locking, the designer performs minor architectural modifications in the design to conceal the functionality from any malicious parties. In this paper, we have analyzed logic locking schemes like Encrypt Flip-Flop and D-MUX. These schemes have been used to encrypt a Y86-64 processor and the encrypted design was synthesized to obtain a locked netlist. To further enhance the security, a key generation module was added to the design. The key parameters such as resource utilization and hamming distance were compared for all the cases. ML-based logic locking attacks are emerging techniques for efficient key retrieval. Some of the ML-based attacks from both oracle-less and oracle-guided classes were analyzed in this study. One of the attacks which was discussed called SWEEP was implemented and tested on all the implemented encrypted designs.\",\"PeriodicalId\":272590,\"journal\":{\"name\":\"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iemcon53756.2021.9623118\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iemcon53756.2021.9623118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Developing Attack Resilience in Y86 Processor using Logic Locking
The majority of processors and ICs on the market today are susceptible to intellectual property theft and hardware trojan insertion. This is a significant security risk for both the manufacturer and the end user. Logic Locking is a prevalent method for tackling such problems. In Logic locking, the designer performs minor architectural modifications in the design to conceal the functionality from any malicious parties. In this paper, we have analyzed logic locking schemes like Encrypt Flip-Flop and D-MUX. These schemes have been used to encrypt a Y86-64 processor and the encrypted design was synthesized to obtain a locked netlist. To further enhance the security, a key generation module was added to the design. The key parameters such as resource utilization and hamming distance were compared for all the cases. ML-based logic locking attacks are emerging techniques for efficient key retrieval. Some of the ML-based attacks from both oracle-less and oracle-guided classes were analyzed in this study. One of the attacks which was discussed called SWEEP was implemented and tested on all the implemented encrypted designs.