A logic obfuscation attack method based on gate-level information flow tracing techniques

Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis me...

Full description

Bibliographic Details
Main Authors: LIU Liang, ZHU Jiacheng, ZHANG Zhe, SHEN Lixiang, SUN Yufeng, MU Dejun
Format: Article
Language:zho
Published: EDP Sciences 2024-02-01
Series:Xibei Gongye Daxue Xuebao
Subjects:
Online Access:https://www.jnwpu.org/articles/jnwpu/full_html/2024/01/jnwpu2024421p78/jnwpu2024421p78.html
_version_ 1797221490208276480
author LIU Liang
ZHU Jiacheng
ZHANG Zhe
SHEN Lixiang
SUN Yufeng
MU Dejun
author_facet LIU Liang
ZHU Jiacheng
ZHANG Zhe
SHEN Lixiang
SUN Yufeng
MU Dejun
author_sort LIU Liang
collection DOAJ
description Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effect and efficiency for benchmarks generated by five obfuscated encryption algorithms with two test area costs.
first_indexed 2024-04-24T13:06:16Z
format Article
id doaj.art-611ca29e02194d288dad8f828dd90bb5
institution Directory Open Access Journal
issn 1000-2758
2609-7125
language zho
last_indexed 2024-04-24T13:06:16Z
publishDate 2024-02-01
publisher EDP Sciences
record_format Article
series Xibei Gongye Daxue Xuebao
spelling doaj.art-611ca29e02194d288dad8f828dd90bb52024-04-05T07:31:28ZzhoEDP SciencesXibei Gongye Daxue Xuebao1000-27582609-71252024-02-01421788310.1051/jnwpu/20244210078jnwpu2024421p78A logic obfuscation attack method based on gate-level information flow tracing techniquesLIU Liang0ZHU Jiacheng1ZHANG Zhe2SHEN Lixiang3SUN Yufeng4MU Dejun5Beijing Smart-Chip Microelectronics Technology Co., Ltd.Shenzhen Research Institute of Northwestern Polytechnical UniversityBeijing Smart-Chip Microelectronics Technology Co., Ltd.Shenzhen Research Institute of Northwestern Polytechnical UniversityBeijing Smart-Chip Microelectronics Technology Co., Ltd.Shenzhen Research Institute of Northwestern Polytechnical UniversityLogical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effect and efficiency for benchmarks generated by five obfuscated encryption algorithms with two test area costs.https://www.jnwpu.org/articles/jnwpu/full_html/2024/01/jnwpu2024421p78/jnwpu2024421p78.htmllogic obfuscation attackgate level information flow trackingintegrated circuitsintellectual property protection
spellingShingle LIU Liang
ZHU Jiacheng
ZHANG Zhe
SHEN Lixiang
SUN Yufeng
MU Dejun
A logic obfuscation attack method based on gate-level information flow tracing techniques
Xibei Gongye Daxue Xuebao
logic obfuscation attack
gate level information flow tracking
integrated circuits
intellectual property protection
title A logic obfuscation attack method based on gate-level information flow tracing techniques
title_full A logic obfuscation attack method based on gate-level information flow tracing techniques
title_fullStr A logic obfuscation attack method based on gate-level information flow tracing techniques
title_full_unstemmed A logic obfuscation attack method based on gate-level information flow tracing techniques
title_short A logic obfuscation attack method based on gate-level information flow tracing techniques
title_sort logic obfuscation attack method based on gate level information flow tracing techniques
topic logic obfuscation attack
gate level information flow tracking
integrated circuits
intellectual property protection
url https://www.jnwpu.org/articles/jnwpu/full_html/2024/01/jnwpu2024421p78/jnwpu2024421p78.html
work_keys_str_mv AT liuliang alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT zhujiacheng alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT zhangzhe alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT shenlixiang alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT sunyufeng alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT mudejun alogicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT liuliang logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT zhujiacheng logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT zhangzhe logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT shenlixiang logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT sunyufeng logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques
AT mudejun logicobfuscationattackmethodbasedongatelevelinformationflowtracingtechniques