A logic obfuscation attack method based on gate-level information flow tracing techniques
Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis me...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
EDP Sciences
2024-02-01
|
Series: | Xibei Gongye Daxue Xuebao |
Subjects: | |
Online Access: | https://www.jnwpu.org/articles/jnwpu/full_html/2024/01/jnwpu2024421p78/jnwpu2024421p78.html |
_version_ | 1797221490208276480 |
---|---|
author | LIU Liang ZHU Jiacheng ZHANG Zhe SHEN Lixiang SUN Yufeng MU Dejun |
author_facet | LIU Liang ZHU Jiacheng ZHANG Zhe SHEN Lixiang SUN Yufeng MU Dejun |
author_sort | LIU Liang |
collection | DOAJ |
description | Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effect and efficiency for benchmarks generated by five obfuscated encryption algorithms with two test area costs. |
first_indexed | 2024-04-24T13:06:16Z |
format | Article |
id | doaj.art-611ca29e02194d288dad8f828dd90bb5 |
institution | Directory Open Access Journal |
issn | 1000-2758 2609-7125 |
language | zho |
last_indexed | 2024-04-24T13:06:16Z |
publishDate | 2024-02-01 |
publisher | EDP Sciences |
record_format | Article |
series | Xibei Gongye Daxue Xuebao |
spelling | doaj.art-611ca29e02194d288dad8f828dd90bb52024-04-05T07:31:28ZzhoEDP SciencesXibei Gongye Daxue Xuebao1000-27582609-71252024-02-01421788310.1051/jnwpu/20244210078jnwpu2024421p78A logic obfuscation attack method based on gate-level information flow tracing techniquesLIU Liang0ZHU Jiacheng1ZHANG Zhe2SHEN Lixiang3SUN Yufeng4MU Dejun5Beijing Smart-Chip Microelectronics Technology Co., Ltd.Shenzhen Research Institute of Northwestern Polytechnical UniversityBeijing Smart-Chip Microelectronics Technology Co., Ltd.Shenzhen Research Institute of Northwestern Polytechnical UniversityBeijing Smart-Chip Microelectronics Technology Co., Ltd.Shenzhen Research Institute of Northwestern Polytechnical UniversityLogical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effect and efficiency for benchmarks generated by five obfuscated encryption algorithms with two test area costs.https://www.jnwpu.org/articles/jnwpu/full_html/2024/01/jnwpu2024421p78/jnwpu2024421p78.htmllogic obfuscation attackgate level information flow trackingintegrated circuitsintellectual property protection |
spellingShingle | LIU Liang ZHU Jiacheng ZHANG Zhe SHEN Lixiang SUN Yufeng MU Dejun A logic obfuscation attack method based on gate-level information flow tracing techniques Xibei Gongye Daxue Xuebao logic obfuscation attack gate level information flow tracking integrated circuits intellectual property protection |
title | A logic obfuscation attack method based on gate-level information flow tracing techniques |
title_full | A logic obfuscation attack method based on gate-level information flow tracing techniques |
title_fullStr | A logic obfuscation attack method based on gate-level information flow tracing techniques |
title_full_unstemmed | A logic obfuscation attack method based on gate-level information flow tracing techniques |
title_short | A logic obfuscation attack method based on gate-level information flow tracing techniques |
title_sort | logic obfuscation attack method based on gate level information flow tracing techniques |
topic | logic obfuscation attack gate level information flow tracking integrated circuits intellectual property protection |
url | https://www.jnwpu.org/articles/jnwpu/full_html/2024/01/jnwpu2024421p78/jnwpu2024421p78.html |
work_keys_str_mv | AT liuliang alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT zhujiacheng alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT zhangzhe alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT shenlixiang alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT sunyufeng alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT mudejun alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT liuliang logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT zhujiacheng logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT zhangzhe logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT shenlixiang logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT sunyufeng logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques AT mudejun logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques |