The University of Southampton
University of Southampton Institutional Repository

ZeKi: A zero-knowledge dynamic logic locking implementation with resilience to multiple attacks

ZeKi: A zero-knowledge dynamic logic locking implementation with resilience to multiple attacks
ZeKi: A zero-knowledge dynamic logic locking implementation with resilience to multiple attacks

In recent years, hardware security has gained significant attention, particularly in the context of protecting Integrated Circuits (ICs) from reverse engineering (piracy), counterfeiting, and overproduction. Logic locking, also known as logic obfuscation, has emerged as a solution to safeguard the vast majority of general ICs. However, traditional logic locking methods, including some state-of-the-art approaches, are vulnerable to Satisfiability (SAT) attacks, structural attacks, and sensitization attacks. Additionally, there is a potential threat from internal IC designers who are well-versed in logic locking. To address these threats by dynamic way with less overhead, we proposes a comprehensive logic locking design and implementing framework called ZeKi: Dynamic Logic Locking (DLL) by 'Zero-Knowledge' Implementation, an adaptive approach that customises the implementation of diverse locking mechanisms with the lower overhead for each unique design. The implemented DLL provides defence against all attacks mehtioned above. To our best knowledge, Z e K i is the first logic locking strategy to implement 'zero-knowledge' feature which effectively safeguards the design against potential malicious attacks from the design team. ZeKi's DLL matches SFLL-HD0 in SAT attack resistance, with logarithmically increasing DIPs; and a superior average Hamming difference of 8 9. 5 compared to zero in other schemes on structural attack resistance. It also offers five times the resistance of RLL against sensitization attacks. Zeki's DLL incurs lowest average power and area overheads of 4.27% and 4.48%, respectively.

hardware security, logic locking, logic obfuscation
2164-1676
IEEE
Zhang, Yue
51494047-017e-4f51-86b8-a2554ba28e77
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Wang, Haoyu
3d04a266-1db2-42a6-9a4d-052c33c43873
Gohringer, Diana
Gabler, Uwe
Harbaum, Tanja
Hofmann, Klaus
Zhang, Yue
51494047-017e-4f51-86b8-a2554ba28e77
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Wang, Haoyu
3d04a266-1db2-42a6-9a4d-052c33c43873
Gohringer, Diana
Gabler, Uwe
Harbaum, Tanja
Hofmann, Klaus

Zhang, Yue, Halak, Basel and Wang, Haoyu (2024) ZeKi: A zero-knowledge dynamic logic locking implementation with resilience to multiple attacks. Gohringer, Diana, Gabler, Uwe, Harbaum, Tanja and Hofmann, Klaus (eds.) In Proceedings - 2024 IEEE 37th International System-on-Chip Conference, SOCC 2024. IEEE.. (doi:10.1109/SOCC62300.2024.10737800).

Record type: Conference or Workshop Item (Paper)

Abstract

In recent years, hardware security has gained significant attention, particularly in the context of protecting Integrated Circuits (ICs) from reverse engineering (piracy), counterfeiting, and overproduction. Logic locking, also known as logic obfuscation, has emerged as a solution to safeguard the vast majority of general ICs. However, traditional logic locking methods, including some state-of-the-art approaches, are vulnerable to Satisfiability (SAT) attacks, structural attacks, and sensitization attacks. Additionally, there is a potential threat from internal IC designers who are well-versed in logic locking. To address these threats by dynamic way with less overhead, we proposes a comprehensive logic locking design and implementing framework called ZeKi: Dynamic Logic Locking (DLL) by 'Zero-Knowledge' Implementation, an adaptive approach that customises the implementation of diverse locking mechanisms with the lower overhead for each unique design. The implemented DLL provides defence against all attacks mehtioned above. To our best knowledge, Z e K i is the first logic locking strategy to implement 'zero-knowledge' feature which effectively safeguards the design against potential malicious attacks from the design team. ZeKi's DLL matches SFLL-HD0 in SAT attack resistance, with logarithmically increasing DIPs; and a superior average Hamming difference of 8 9. 5 compared to zero in other schemes on structural attack resistance. It also offers five times the resistance of RLL against sensitization attacks. Zeki's DLL incurs lowest average power and area overheads of 4.27% and 4.48%, respectively.

This record has no associated files available for download.

More information

Published date: 2024
Keywords: hardware security, logic locking, logic obfuscation

Identifiers

Local EPrints ID: 496733
URI: http://eprints.soton.ac.uk/id/eprint/496733
ISSN: 2164-1676
PURE UUID: 3e753abc-0b57-43b7-a8fb-ab820256a734
ORCID for Basel Halak: ORCID iD orcid.org/0000-0003-3470-7226

Catalogue record

Date deposited: 07 Jan 2025 22:10
Last modified: 06 Mar 2025 02:44

Export record

Altmetrics

Contributors

Author: Yue Zhang
Author: Basel Halak ORCID iD
Author: Haoyu Wang
Editor: Diana Gohringer
Editor: Uwe Gabler
Editor: Tanja Harbaum
Editor: Klaus Hofmann

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

Loading...

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

Back to top

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×