论文:2024,Vol:42,Issue(1):78-83
引用本文:
刘亮, 朱嘉诚, 张喆, 沈利香, 孙玉峰, 慕德俊. 基于门级信息流追踪技术的逻辑混淆攻击方法[J]. 西北工业大学学报
LIU Liang, ZHU Jiacheng, ZHANG Zhe, SHEN Lixiang, SUN Yufeng, MU Dejun. A logic obfuscation attack method based on gate-level information flow tracing techniques[J]. Journal of Northwestern Polytechnical University

基于门级信息流追踪技术的逻辑混淆攻击方法
刘亮1, 朱嘉诚2, 张喆1, 沈利香2, 孙玉峰1, 慕德俊2
1. 北京智芯微电子科技有限公司, 北京 100000;
2. 西北工业大学深圳研究院, 广东 深圳 518057
摘要:
逻辑混淆技术是一种实现知识产权保护、防止逆向工程的主流技术手段。提出了基于门级信息流追踪技术的逻辑混淆攻击方法,采用门级抽象层次上的信息流分析方法,建立信息流模型,对输出及其污染标签进行约束,使用SAT求解器求解满足约束条件的混淆密钥序列。实验结果表明该攻击方法对5种混淆加密算法、2种面积开销生成的测试基准有很好的破解效果和效率。
关键词:    逻辑混淆攻击    门级信息流追踪    集成电路    知识产权保护   
A logic obfuscation attack method based on gate-level information flow tracing techniques
LIU Liang1, ZHU Jiacheng2, ZHANG Zhe1, SHEN Lixiang2, SUN Yufeng1, MU Dejun2
1. Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing 100000, China;
2. Shenzhen Research Institute of Northwestern Polytechnical University, Xi'an 710072, China
Abstract:
Logical obfuscation technique is a mainstream technical means to achieve intellectual property protection and prevent reverse engineering. In this paper, we propose a logical obfuscation attack method based on the gate-level information flow tracking technique, using the information flow analysis method at the gate-level abstraction level, establishing an information flow model, constraining the output and its contamination labels, and solving the obfuscation key sequence satisfying the constraints using an SAT solver. The experimental results show that the attack method has good cracking effect and efficiency for benchmarks generated by five obfuscated encryption algorithms with two test area costs.
Key words:    logic obfuscation attack    gate level information flow tracking    integrated circuits    intellectual property protection   
收稿日期: 2023-02-20     修回日期:
DOI: 10.1051/jnwpu/20244210078
基金项目: 北京智芯微电子科技有限公司实验室开放基金(SGSC0000SJQT2207164)资助
通讯作者: 朱嘉诚(1996-),博士研究生 e-mail:zhu_jc@mail.nwpu.edu.cn     Email:zhu_jc@mail.nwpu.edu.cn
作者简介: 刘亮(1982-),研究员
相关功能
PDF(1181KB) Free
打印本文
把本文推荐给朋友
作者相关文章
刘亮  在本刊中的所有文章
朱嘉诚  在本刊中的所有文章
张喆  在本刊中的所有文章
沈利香  在本刊中的所有文章
孙玉峰  在本刊中的所有文章
慕德俊  在本刊中的所有文章

参考文献:
[1] ABDEL-HAMID A T, TAHAR S, ABOULHAMID E M. IP watermarking techniques: survey and comparison[C]//The 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications, 2003: 60-65
[2] YASIN M, SINANOGLU O. Evolution of logic locking[C]//2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017: 1-6
[3] HERDER C, YU M D, KOUSHANFAR F, et al. Physical unclonable functions and applications: a tutorial[J]. Proceedings of the IEEE, 2014, 102(8): 1126-1141
[4] MENON V V, KOLHE G, SCHMIDT A, et al. System-level framework for logic obfuscation with quantified metrics for evaluation[C]//2019 IEEE Cybersecurity Development, 2019: 89-100
[5] CHAKRABORTY R S, BHUNIA S. HARPOON: an obfuscation-based SoC design methodology for hardware protection[J]. IEEE Trans on Computer-Aided Design of Integrated Circuits and Systems, 2009, 28(10): 1493-1502
[6] SUBRAMANYAN P, RAY S, MALIK S. Evaluating the security of logic encryption algorithms[C]//2015 IEEE International Symposium on Hardware Oriented Security and Trust, 2015: 137-143
[7] SHAMSI K, LI M, PAN D Z, et al. KC2: key-condition crunching for fast sequential circuit deobfuscation[C]//2019 Design, Automation & Test in Europe Conference & Exhibition, 2019: 534-539
[8] EL MASSAD M, GARG S, TRIPUNITARA M. Reverse engineering camouflaged sequential circuits without scan access[C]//2017 IEEE/ACM International Conference on Computer-Aided Design, 2017: 33-40
[9] SHAMSI K, LI M, MEADE T, et al. AppSAT: approximately deobfuscating integrated circuits[C]//2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017: 95-100
[10] YASIN M, MAZUMDAR B, SINANOGLU O, et al. Removal attacks on logic locking and camouflaging techniques[J]. IEEE Trans on Emerging Topics in Computing, 2017, 8(2): 517-532
[11] TIWARI M, WASSEL H M, MAZLOOM B, et al. Complete information flow tracking from the gates up[C]//Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems,2009