CryptoDB
Ozgur Sinanoglu
Publications
Year
Venue
Title
2024
TCHES
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
Abstract
Hardware Trojans (HTs) are a longstanding threat to secure computation. Among different threat models, it is the fabrication-time insertion of additional malicious logic directly into the layout of integrated circuits (ICs) that constitutes the most versatile, yet challenging scenario, for both attackers and defenders.Here, we present a large-scale, first-of-its-kind community effort through red-versus-blue teaming that thoroughly explores this threat. Four independently competing blue teams of 23 IC designers in total had to analyze and fix vulnerabilities of representative IC layouts at the pre-silicon stage, whereas a red team of 3 experts in hardware security and IC design continuously pushed the boundaries of these defense efforts through different HTs and novel insertion techniques. Importantly, we find that, despite the blue teams’ commendable design efforts, even highly-optimized layouts retained at least some exploitable vulnerabilities.Our effort follows a real-world setting for a modern 7nm technology node and industrygrade tooling for IC design, all embedded into a fully-automated and extensible benchmarking framework. To ensure the relevance of this work, strict rules that adhere to real-world requirements for IC design and manufacturing were postulated by the organizers. For example, not a single violation for timing and design-rule checks were allowed for defense techniques. Besides, in an advancement over prior art, neither red nor blue teams were allowed to use any so-called fillers and spares for trivial attack or defense approaches.Finally, we release all methods and artifacts: the representative IC layouts and HTs, the devised attack and defense techniques, the evaluation metrics and setup, the technology setup and commercial-grade reference flow for IC design, the encompassing benchmarking framework, and all best results. This full release enables the community to continue exploring this important challenge for hardware security, in particular to focus on the urgent need for further advancements in defense strategies.
2021
TCHES
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
📺
Abstract
Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miterbased Boolean satisfiability (SAT) attack that steered the research in the direction of developing SAT-resilient schemes. These schemes, however achieved SAT resilience at the cost of low output corruption. Recently, cascaded locking (CAS-Lock) [SXTF20a] was proposed that provides non-trivial output corruption all-the-while maintaining resilience to the SAT attack. Regardless of the theoretical properties, we revisit some of the assumptions made about its implementation, especially about security-unaware synthesis tools, and subsequently expose a set of structural vulnerabilities that can be exploited to break these schemes. We propose our attacks on baseline CAS-Lock as well as mirrored CAS (M-CAS), an improved version of CAS-Lock. We furnish extensive simulation results of our attacks on ISCAS’85 and ITC’99 benchmarks, where we show that CAS-Lock/M-CAS can be broken with ∼94% success rate. Further, we open-source all implementation scripts, locked circuits, and attack scripts for the community. Finally, we discuss the pitfalls of point function-based locking techniques including Anti-SAT [XS18] and Stripped Functionality Logic Locking(SFLL-HD) [YSN+17], which suffer from similar implementation issues.
Coauthors
- Shunyang Bi (1)
- Zhijie Cai (1)
- Guohao Chen (1)
- Jianli Chen (1)
- Chun-Wei Chiu (1)
- Mohammad Eslami (1)
- Bangqi Fu (1)
- Guangxin Guo (1)
- Min-Feng Hsieh (1)
- Ramesh Karri (1)
- Johann Knechtel (1)
- Anthony W. H. Lau (1)
- Jiawei Li (1)
- Cong Li (1)
- Nimisha Limaye (1)
- Qin Luo (1)
- Chia-Hsiu Ou (1)
- Samuel Pagliarini (1)
- Binggang Qiu (1)
- Abhrajit Sengupta (1)
- Ozgur Sinanoglu (2)
- Yang Sun (1)
- Zhengguang Tang (1)
- Xingyu Tong (1)
- Ting-Chi Wang (1)
- Qijing Wang (1)
- Fangzhou Wang (1)
- Min Wei (1)
- Haonan Wu (1)
- Hailong You (1)
- Evangeline F. Y. Young (1)
- Jun Yu (1)
- Benchao Zhu (1)
- Peng Zou (1)