Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs
Using Genetic Algorithm
- URL: http://arxiv.org/abs/2003.13904v1
- Date: Tue, 31 Mar 2020 01:38:00 GMT
- Title: Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs
Using Genetic Algorithm
- Authors: Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, and Domenic Forte
- Abstract summary: We use algorithms based on evolutionary strategies to investigate the security of analog obfuscation/locking techniques.
We present a genetic algorithm (GA) approach which is capable of completely breaking a locked analog circuit.
We implement both a more naive satisfiability modulo theory (SMT)-based attack on common analog benchmark circuits obfuscated by combinational locking and parameter biasing.
- Score: 3.0396374367054784
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Hardware intellectual property (IP) theft is a major issue in today's
globalized supply chain. To address it, numerous logic locking and obfuscation
techniques have been proposed. While locking initially focused on digital
integrated circuits (ICs), there have been recent attempts to extend it to
analog ICs, which are easier to reverse engineer and to copy than digital ICs.
In this paper, we use algorithms based on evolutionary strategies to
investigate the security of analog obfuscation/locking techniques. We present a
genetic algorithm (GA) approach which is capable of completely breaking a
locked analog circuit by finding either its obfuscation key or its obfuscated
parameters. We implement both the GA attack as well as a more naive
satisfiability modulo theory (SMT)-based attack on common analog benchmark
circuits obfuscated by combinational locking and parameter biasing. We find
that GA attack can unlock all the circuits using only the locked netlist and an
unlocked chip in minutes. On the other hand, while the SMT attack converges
faster, it requires circuit specification to execute and it also returns
multiple keys that need to be brute-forced by a post-processing step. We also
discuss how the GA attack can generalize to other recent analog locking
techniques not tested in the paper
Related papers
- SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection [1.804933160047171]
Existing logic locking techniques are vulnerable to SAT-based attacks.
Several SAT-resistant logic locking methods are reported; they require significant overhead.
This paper proposes a novel input dependent key-based logic locking (IDKLL) that effectively prevents SAT-based attacks with low overhead.
arXiv Detail & Related papers (2024-06-27T11:17:06Z) - Performance Comparison of Various Modes of Advanced Encryption Standard [0.0]
This study proposes a normalized Gini impurity (NGI) to verify the security of each mode.
This study primarily compares the Electronic Codebook (ECB) mode, Cipher Block Chaining (CBC) mode, Counter (CTR) mode, Counter with CBC-Message Authentication Code (MAC) mode, and Galois Counter Mode (GCM)
arXiv Detail & Related papers (2024-05-22T01:09:49Z) - RTL Interconnect Obfuscation By Polymorphic Switch Boxes For Secure Hardware Generation [0.0]
We present an interconnect obfuscation scheme at the Register-Transfer Level (RTL) using Switch Boxes (SBs) constructed of Polymorphic Transistors.
A polymorphic SB can be designed using the same transistor count as its Complementary-Metal-Oxide-Semiconductor based counterpart.
arXiv Detail & Related papers (2024-04-11T01:42:01Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - Adaptive Planning Search Algorithm for Analog Circuit Verification [53.97809573610992]
We propose a machine learning (ML) approach, which uses less simulations.
We show that the proposed approach is able to provide OCCs closer to the specifications for all circuits.
arXiv Detail & Related papers (2023-06-23T12:57:46Z) - Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning
Accelerators [4.605674633999923]
We show how logic locking can be used to compromise the security of a neural accelerator it protects.
Specifically, we show how the deterministic errors caused by incorrect keys can be harnessed to produce neural-trojan-style backdoors.
arXiv Detail & Related papers (2023-04-12T17:55:34Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Challenging the Security of Logic Locking Schemes in the Era of Deep
Learning: A Neuroevolutionary Approach [0.2982610402087727]
Deep learning is being introduced in the domain of logic locking.
We present SnapShot: a novel attack on logic locking that is the first of its kind to utilize artificial neural networks.
We show that SnapShot achieves an average key prediction accuracy of 82.60% for the selected attack scenario.
arXiv Detail & Related papers (2020-11-20T13:03:19Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z) - Faster Secure Data Mining via Distributed Homomorphic Encryption [108.77460689459247]
Homomorphic Encryption (HE) is receiving more and more attention recently for its capability to do computations over the encrypted field.
We propose a novel general distributed HE-based data mining framework towards one step of solving the scaling problem.
We verify the efficiency and effectiveness of our new framework by testing over various data mining algorithms and benchmark data-sets.
arXiv Detail & Related papers (2020-06-17T18:14:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.