ZeKi: A zero-knowledge dynamic logic locking implementation with resilience to multiple attacks
ZeKi: A zero-knowledge dynamic logic locking implementation with resilience to multiple attacks
In recent years, hardware security has gained significant attention, particularly in the context of protecting Integrated Circuits (ICs) from reverse engineering (piracy), counterfeiting, and overproduction. Logic locking, also known as logic obfuscation, has emerged as a solution to safeguard the vast majority of general ICs. However, traditional logic locking methods, including some state-of-the-art approaches, are vulnerable to Satisfiability (SAT) attacks, structural attacks, and sensitization attacks. Additionally, there is a potential threat from internal IC designers who are well-versed in logic locking. To address these threats by dynamic way with less overhead, we proposes a comprehensive logic locking design and implementing framework called ZeKi: Dynamic Logic Locking (DLL) by 'Zero-Knowledge' Implementation, an adaptive approach that customises the implementation of diverse locking mechanisms with the lower overhead for each unique design. The implemented DLL provides defence against all attacks mehtioned above. To our best knowledge, Z e K i is the first logic locking strategy to implement 'zero-knowledge' feature which effectively safeguards the design against potential malicious attacks from the design team. ZeKi's DLL matches SFLL-HD0 in SAT attack resistance, with logarithmically increasing DIPs; and a superior average Hamming difference of 8 9. 5 compared to zero in other schemes on structural attack resistance. It also offers five times the resistance of RLL against sensitization attacks. Zeki's DLL incurs lowest average power and area overheads of 4.27% and 4.48%, respectively.
hardware security, logic locking, logic obfuscation
Zhang, Yue
51494047-017e-4f51-86b8-a2554ba28e77
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Wang, Haoyu
3d04a266-1db2-42a6-9a4d-052c33c43873
2024
Zhang, Yue
51494047-017e-4f51-86b8-a2554ba28e77
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Wang, Haoyu
3d04a266-1db2-42a6-9a4d-052c33c43873
Zhang, Yue, Halak, Basel and Wang, Haoyu
(2024)
ZeKi: A zero-knowledge dynamic logic locking implementation with resilience to multiple attacks.
Gohringer, Diana, Gabler, Uwe, Harbaum, Tanja and Hofmann, Klaus
(eds.)
In Proceedings - 2024 IEEE 37th International System-on-Chip Conference, SOCC 2024.
IEEE..
(doi:10.1109/SOCC62300.2024.10737800).
Record type:
Conference or Workshop Item
(Paper)
Abstract
In recent years, hardware security has gained significant attention, particularly in the context of protecting Integrated Circuits (ICs) from reverse engineering (piracy), counterfeiting, and overproduction. Logic locking, also known as logic obfuscation, has emerged as a solution to safeguard the vast majority of general ICs. However, traditional logic locking methods, including some state-of-the-art approaches, are vulnerable to Satisfiability (SAT) attacks, structural attacks, and sensitization attacks. Additionally, there is a potential threat from internal IC designers who are well-versed in logic locking. To address these threats by dynamic way with less overhead, we proposes a comprehensive logic locking design and implementing framework called ZeKi: Dynamic Logic Locking (DLL) by 'Zero-Knowledge' Implementation, an adaptive approach that customises the implementation of diverse locking mechanisms with the lower overhead for each unique design. The implemented DLL provides defence against all attacks mehtioned above. To our best knowledge, Z e K i is the first logic locking strategy to implement 'zero-knowledge' feature which effectively safeguards the design against potential malicious attacks from the design team. ZeKi's DLL matches SFLL-HD0 in SAT attack resistance, with logarithmically increasing DIPs; and a superior average Hamming difference of 8 9. 5 compared to zero in other schemes on structural attack resistance. It also offers five times the resistance of RLL against sensitization attacks. Zeki's DLL incurs lowest average power and area overheads of 4.27% and 4.48%, respectively.
This record has no associated files available for download.
More information
Published date: 2024
Keywords:
hardware security, logic locking, logic obfuscation
Identifiers
Local EPrints ID: 496733
URI: http://eprints.soton.ac.uk/id/eprint/496733
ISSN: 2164-1676
PURE UUID: 3e753abc-0b57-43b7-a8fb-ab820256a734
Catalogue record
Date deposited: 07 Jan 2025 22:10
Last modified: 06 Mar 2025 02:44
Export record
Altmetrics
Contributors
Author:
Yue Zhang
Author:
Basel Halak
Author:
Haoyu Wang
Editor:
Diana Gohringer
Editor:
Uwe Gabler
Editor:
Tanja Harbaum
Editor:
Klaus Hofmann
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
Loading...
View more statistics