Treffer: Noise‐based logic locking scheme against signal probability skew analysis.

Title:
Noise‐based logic locking scheme against signal probability skew analysis.
Authors:
Rezaei, Ahmad1 ahmadrezaeiq@gmail.com, Mahani, Ali1 amahani@uk.ac.ir
Source:
IET Computers & Digital Techniques (Wiley-Blackwell). Jul2021, Vol. 15 Issue 4, p279-295. 17p.
Database:
Business Source Premier

Weitere Informationen

Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats. In this technique, an IC is locked, and its functionality is retrieved when the right key is loaded onto it. We propose 'noise‐based' logic locking, consisting of two separate compliment blocks, which function in three states. By flipping a signal once in the circuit, these modules add corruption to the circuit, whereas either flipping the same signal twice or not flipping leads to the correct functionality. Thus, a low probability skew with a low corruption in the output is obtained by utilisation of these flipping states. We have improved SAT attack resiliency based on time by 17% for a locking block with 14 primary inputs in comparison with the well‐known anti‐SAT. The area overhead is less in comparison with other schemes, in which extra dummy parts or obfuscation elements are added to their circuit. Also, more crucially, our locking blocks are immune to SPS attack solely. After executing various attacks, retrieved circuits indicate improved overall resiliency against automatic test pattern generation based and approximate guided removal attacks as well. [ABSTRACT FROM AUTHOR]

Copyright of IET Computers & Digital Techniques (Wiley-Blackwell) is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)