帳號:guest(18.191.116.19)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):江孝友
作者(外文):Chiang, Hsiao-Yu
論文名稱(中文):迴路鎖:基於邏輯優化的迴路化邏輯加密技術
論文名稱(外文):LOOPLock : LOgic OPtimization based Cyclic Logic Locking
指導教授(中文):王俊堯
指導教授(外文):Wang, Chun-Yao
口試委員(中文):黃俊達
陳勇志
口試委員(外文):Huang, Juinn-Dar
Chen, Yung-Chih
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學號:106062597
出版年(民國):108
畢業學年度:107
語文別:英文
論文頁數:27
中文關鍵詞:硬體安全迴路化邏輯加密技術布林攻擊技術迴路化布林攻擊技術邏輯優化
外文關鍵詞:hardware securitycyclic logic lockingSAT AttackCycSATlogic optimization
相關次數:
  • 推薦推薦:0
  • 點閱點閱:389
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
SAT Attack,CycSAT和Removal Attack已經證明了它們能夠破解大多數現有的邏輯加密技術。在本文中,我們提出了一種新的迴路化邏輯加密技術來同時使這些攻擊技術無效。我們的主要目的是建構非組合性迴路來加密電路,並且在提供正確密碼時能夠保留這些非組合性迴路。實驗結果展示了該方法的有效性和低面積成本。
SAT Attack, CycSAT, and Removal Attack have demonstrated their abilities tobreak most existing logic locking methods. In this paper, we propose a new cycliclogic locking method to invalidate these attacks simultaneously. Our main intentionis to create non-combinational cycles to lock a circuit, and the cycles need to bepreserved when the secret key is fed. The experimental results show the effectivenessand low area overhead of the proposed method.
中文摘要--------------i
Abstract-------------ii
誌謝辭---------------iii
Contents-------------iv
List of Tables-------vi
List of Figures------vii
1 Introduction--------1
2 Preliminaries-------4
2.1 Background--------4
2.2 Node Merging (NM)---5
2.3 NM-based cycle generation---7
3 Our Method--------------------10
4 Evaluation--------------------14
4.1 SAT Attack------------------14
4.2 CycSAT----------------------16
4.3 Removal Attack--------------18
5 Experimental Results----------19
6 Conclusions-------------------25
Bibliography--------------------26
[1] Kimia Zamiri Azar et al., “SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks,” IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, pp.
97-122.
[2] J.-H. Chen et al., “Synthesis and Verification of Cyclic Combinational Circuits,” in Proc. of SOCC, 2015, pp. 257-262.
[3] Y.-C. Chen and C.-Y. Wang, “Fast Node Merging with Don’t Cares Using Logic Implications,” IEEE TCAD, pp. 1827-1832, 2010.
[4] A. Chakraborty et al., “TimingSAT: Timing Profile Embedded SAT Attack,” in Proc. of ICCAD, 2018, pp. 6:1-6:6.
[5] M. Chen et al., “Hardware Protection via Logic Locking Test Points,” IEEE TCAD, pp. 3020-3030, 2018.
[6] J. A. Roy et al., “Ending Piracy of Integrated Circuits,” Computer, vol. 43, no. 10, pp. 30-38, 2010.
[7] A. Rezaei et al., “Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks,” in Proc. of DATE, 2018, pp. 85-90.
[8] S. Roshanisefat et al., “SRClock: SAT-resistant Cyclic Logic Locking for Protecting the Hardware,” in Proc. of GLSVLSI, 2018, pp. 153-158.
[9] A. Sengupta and M. Rathor, “Security of Functionally Obfuscated DSP Core
Against Removal Attack Using SHA-512 Based Key Encryption Hardware,”
IEEE Access, vol.7, pp. 4598-4610.
[10] K. Shamsi et al., “Cyclic Obfuscation for Creating SAT-Unresolvable Circuits,” in Proc. of GLSVLSI, 2017, pp. 173-178.
[11] K. Shamsi et al., “AppSAT: Approximately deobfuscating integrated circuits,” in Proc. of HOST, 2017, pp. 95-100.
[12] P. Subramanyan et al., “Evaluating the Security of Logic Encryption Algorithms,” in Proc. of HOST, 2015, pp. 137-143.
[13] Y. Xie and A. Srivastava, “Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction,” In Proc. of DAC, 2017, pp. 1-6.
[14] Y. Xie and A. Srivastava, “Mitigating SAT Attack on Logic Locking,” in Proc. of International Conference on Cryptographic Hardware and Embedded Systems, 2016, pp. 127-146.
[15] M. Yasin et al., “SARlock: SAT Attack Resistant Logic Locking,” in Proc. of
Host, 2016, pp. 236-241.
[16] M. Yasin et al., “Provably-Secure Logic Locking: From Theory To Practice,” in Proc. ACM Conf. on Computer Communications Security, 2017, pp. 1601-1618.
[17] M. Yasin et al., “Removal Attacks on Logic Locking and Camouflaging Techniques,” IEEE Trans. on Emerging Topics in Computing, to be published, doi: 10.1109/TETC.2017.2740364.
[18] M. Yasin et al., “Security Analysis of Anti-SAT,” in Proc. of ASPDAC, 2016, pp. 342-347.
[19] G. Zhang et al., “TimingCamouflage: Improving circuit security against counterfeiting by unconventional timing,” in Proc. of DATE, 2018, pp. 91-96.
[20] H. Zhou et al., “CycSAT: SAT-based attack on cyclic logic encryptions,” in
Proc. of ICCAD, 2017, pp. 49-56.
[21] IWLS2005 Benchmarks. [Online]. Available:
http://iwls.org/iwls2005/benchmarks.html
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *