Noise‐based logic locking scheme against signal probability skew analysis

Abstract Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats. In this technique, an IC is locked, and its function...

Full description

Bibliographic Details
Main Authors: Ahmad Rezaei, Ali Mahani
Format: Article
Language:English
Published: Hindawi-IET 2021-07-01
Series:IET Computers & Digital Techniques
Subjects:
Online Access:https://doi.org/10.1049/cdt2.12022
_version_ 1797429404159180800
author Ahmad Rezaei
Ali Mahani
author_facet Ahmad Rezaei
Ali Mahani
author_sort Ahmad Rezaei
collection DOAJ
description Abstract Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats. In this technique, an IC is locked, and its functionality is retrieved when the right key is loaded onto it. We propose ‘noise‐based’ logic locking, consisting of two separate compliment blocks, which function in three states. By flipping a signal once in the circuit, these modules add corruption to the circuit, whereas either flipping the same signal twice or not flipping leads to the correct functionality. Thus, a low probability skew with a low corruption in the output is obtained by utilisation of these flipping states. We have improved SAT attack resiliency based on time by 17% for a locking block with 14 primary inputs in comparison with the well‐known anti‐SAT. The area overhead is less in comparison with other schemes, in which extra dummy parts or obfuscation elements are added to their circuit. Also, more crucially, our locking blocks are immune to SPS attack solely. After executing various attacks, retrieved circuits indicate improved overall resiliency against automatic test pattern generation based and approximate guided removal attacks as well.
first_indexed 2024-03-09T09:12:41Z
format Article
id doaj.art-22b8852256d24300804b4a0b518a9b8b
institution Directory Open Access Journal
issn 1751-8601
1751-861X
language English
last_indexed 2024-03-09T09:12:41Z
publishDate 2021-07-01
publisher Hindawi-IET
record_format Article
series IET Computers & Digital Techniques
spelling doaj.art-22b8852256d24300804b4a0b518a9b8b2023-12-02T07:58:36ZengHindawi-IETIET Computers & Digital Techniques1751-86011751-861X2021-07-0115427929510.1049/cdt2.12022Noise‐based logic locking scheme against signal probability skew analysisAhmad Rezaei0Ali Mahani1Department of Electrical Engineering Reliable & Smart Systems Laboratory Shahid Bahonar University of Kerman Kerman IranDepartment of Electrical Engineering Reliable & Smart Systems Laboratory Shahid Bahonar University of Kerman Kerman IranAbstract Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats. In this technique, an IC is locked, and its functionality is retrieved when the right key is loaded onto it. We propose ‘noise‐based’ logic locking, consisting of two separate compliment blocks, which function in three states. By flipping a signal once in the circuit, these modules add corruption to the circuit, whereas either flipping the same signal twice or not flipping leads to the correct functionality. Thus, a low probability skew with a low corruption in the output is obtained by utilisation of these flipping states. We have improved SAT attack resiliency based on time by 17% for a locking block with 14 primary inputs in comparison with the well‐known anti‐SAT. The area overhead is less in comparison with other schemes, in which extra dummy parts or obfuscation elements are added to their circuit. Also, more crucially, our locking blocks are immune to SPS attack solely. After executing various attacks, retrieved circuits indicate improved overall resiliency against automatic test pattern generation based and approximate guided removal attacks as well.https://doi.org/10.1049/cdt2.12022automatic test pattern generationprobabilityinvasive softwareintegrated circuit testingcircuit noiselogic circuits
spellingShingle Ahmad Rezaei
Ali Mahani
Noise‐based logic locking scheme against signal probability skew analysis
IET Computers & Digital Techniques
automatic test pattern generation
probability
invasive software
integrated circuit testing
circuit noise
logic circuits
title Noise‐based logic locking scheme against signal probability skew analysis
title_full Noise‐based logic locking scheme against signal probability skew analysis
title_fullStr Noise‐based logic locking scheme against signal probability skew analysis
title_full_unstemmed Noise‐based logic locking scheme against signal probability skew analysis
title_short Noise‐based logic locking scheme against signal probability skew analysis
title_sort noise based logic locking scheme against signal probability skew analysis
topic automatic test pattern generation
probability
invasive software
integrated circuit testing
circuit noise
logic circuits
url https://doi.org/10.1049/cdt2.12022
work_keys_str_mv AT ahmadrezaei noisebasedlogiclockingschemeagainstsignalprobabilityskewanalysis
AT alimahani noisebasedlogiclockingschemeagainstsignalprobabilityskewanalysis