论文标题

基因的攻击:使用遗传算法查找锁定模拟IC的键和参数

Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm

论文作者

Acharya, Rabin Yu, Chowdhury, Sreeja, Ganji, Fatemeh, Forte, Domenic

论文摘要

硬件知识产权(IP)盗窃是当今全球化供应链中的主要问题。为了解决这个问题,已经提出了许多逻辑锁定和混淆技术。虽然锁定最初集中在数字集成电路(ICS)上,但最近仍尝试将其扩展到模拟IC,这比数字IC更易于反向工程和复制。在本文中,我们使用基于进化策略的算法来研究模拟混淆/锁定技术的安全性。我们提出了一种遗传算法(GA)方法,该方法能够通过找到其混淆键或其混淆参数来完全打破锁定的模拟电路。我们同时实施了GA攻击以及基于组合锁定和参数偏置混淆的共同模拟基准电路的基于公共模拟基准电路的基于更幼稚的满意度理论(SMT)的攻击。我们发现,GA攻击只能在几分钟之内使用锁定的网表和解锁芯片解锁所有电路。另一方面,当SMT攻击收敛的速度更快时,它需要电路规范才能执行,并且还返回了需要通过后处理步骤来违反的多个键。我们还讨论了GA攻击如何推广到本文未测试的其他最近的模拟锁定技术

Hardware intellectual property (IP) theft is a major issue in today's globalized supply chain. To address it, numerous logic locking and obfuscation techniques have been proposed. While locking initially focused on digital integrated circuits (ICs), there have been recent attempts to extend it to analog ICs, which are easier to reverse engineer and to copy than digital ICs. In this paper, we use algorithms based on evolutionary strategies to investigate the security of analog obfuscation/locking techniques. We present a genetic algorithm (GA) approach which is capable of completely breaking a locked analog circuit by finding either its obfuscation key or its obfuscated parameters. We implement both the GA attack as well as a more naive satisfiability modulo theory (SMT)-based attack on common analog benchmark circuits obfuscated by combinational locking and parameter biasing. We find that GA attack can unlock all the circuits using only the locked netlist and an unlocked chip in minutes. On the other hand, while the SMT attack converges faster, it requires circuit specification to execute and it also returns multiple keys that need to be brute-forced by a post-processing step. We also discuss how the GA attack can generalize to other recent analog locking techniques not tested in the paper

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源