The University of Southampton
University of Southampton Institutional Repository

Advancing logic locking: a new strategy combining dynamic and zero-knowledge techniques

Advancing logic locking: a new strategy combining dynamic and zero-knowledge techniques
Advancing logic locking: a new strategy combining dynamic and zero-knowledge techniques
The IC industry's growth has heightened attention to hardware security, particularly in the last decade. Major IC companies, aiming to cut costs, have begun outsourcing parts of their supply chain instead of managing it entirely in-house. This cost-saving strategy increases vulnerability to malicious attacks. To counter this, various defence mechanisms like logic locking have been proposed, offering protection against unauthorized IP access and supply chain threats with minimal design flow alterations.
Despite logic locking's many advantages in hardware defence, it confronts two major challenges. Firstly, significant efforts in the field have aimed at extracting secret keys from encrypted designs, particularly to clone IP. The SAT attack notably undermines the efficacy of logic locking. To mitigate this, various techniques like point function-based logic locking (PFB) have emerged, balancing SAT attack resilience with minimal product overhead. However, PFB's fixed mechanism inherently exposes specific properties, making it vulnerable to targeted attacks. Secondly, traditional logic locking presumes the design house's trustworthiness. However, internal malicious actors are a real threat in practice, against which current logic locking methods are ineffective.
This thesis introduces Dynamic Logic Locking (DLL), a new logic locking strategy to address the aforementioned security concerns. DLL's dynamic mechanism, unlike traditional methods, uses randomly generated locking blocks to counter SAT and other logic locking attacks. Its unique mechanism for each design eliminates structural vulnerabilities, unlike conventional fixed-mechanism blocks. Moreover, DLL's random block generation allows for zero-knowledge implementation by designers, who need not know the block's structure or secret key details. This makes DLL robust even against internal malicious attacks within the design house.
This thesis also introduces DLL-se, a sequential variant of DLL, expanding its application to sequential circuits for increased utility. Additionally, it presents a Python-based logic locking tool capable of integrating various logic locking types, including DLL, into Verilog netlists and simulating attacks on logic locking. With its clear GUI, the tool is accessible to designers and students and is suitable for hardware design and educational research.
University of Southampton
Zhang, Yue
51494047-017e-4f51-86b8-a2554ba28e77
Zhang, Yue
51494047-017e-4f51-86b8-a2554ba28e77
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Aniello, Leonardo
9846e2e4-1303-4b8b-9092-5d8e9bb514c3

Zhang, Yue (2025) Advancing logic locking: a new strategy combining dynamic and zero-knowledge techniques. University of Southampton, Doctoral Thesis, 168pp.

Record type: Thesis (Doctoral)

Abstract

The IC industry's growth has heightened attention to hardware security, particularly in the last decade. Major IC companies, aiming to cut costs, have begun outsourcing parts of their supply chain instead of managing it entirely in-house. This cost-saving strategy increases vulnerability to malicious attacks. To counter this, various defence mechanisms like logic locking have been proposed, offering protection against unauthorized IP access and supply chain threats with minimal design flow alterations.
Despite logic locking's many advantages in hardware defence, it confronts two major challenges. Firstly, significant efforts in the field have aimed at extracting secret keys from encrypted designs, particularly to clone IP. The SAT attack notably undermines the efficacy of logic locking. To mitigate this, various techniques like point function-based logic locking (PFB) have emerged, balancing SAT attack resilience with minimal product overhead. However, PFB's fixed mechanism inherently exposes specific properties, making it vulnerable to targeted attacks. Secondly, traditional logic locking presumes the design house's trustworthiness. However, internal malicious actors are a real threat in practice, against which current logic locking methods are ineffective.
This thesis introduces Dynamic Logic Locking (DLL), a new logic locking strategy to address the aforementioned security concerns. DLL's dynamic mechanism, unlike traditional methods, uses randomly generated locking blocks to counter SAT and other logic locking attacks. Its unique mechanism for each design eliminates structural vulnerabilities, unlike conventional fixed-mechanism blocks. Moreover, DLL's random block generation allows for zero-knowledge implementation by designers, who need not know the block's structure or secret key details. This makes DLL robust even against internal malicious attacks within the design house.
This thesis also introduces DLL-se, a sequential variant of DLL, expanding its application to sequential circuits for increased utility. Additionally, it presents a Python-based logic locking tool capable of integrating various logic locking types, including DLL, into Verilog netlists and simulating attacks on logic locking. With its clear GUI, the tool is accessible to designers and students and is suitable for hardware design and educational research.

Text
Thesis1
Available under License University of Southampton Thesis Licence.
Download (5MB)
Text
Final-thesis-submission-Examination-Mr-Yue-Zhang
Restricted to Repository staff only

More information

Published date: 2025

Identifiers

Local EPrints ID: 508724
URI: http://eprints.soton.ac.uk/id/eprint/508724
PURE UUID: f359948b-cdc4-44f2-91e2-3e30d710836b
ORCID for Yue Zhang: ORCID iD orcid.org/0009-0002-9275-1989
ORCID for Basel Halak: ORCID iD orcid.org/0000-0003-3470-7226
ORCID for Leonardo Aniello: ORCID iD orcid.org/0000-0003-2886-8445

Catalogue record

Date deposited: 02 Feb 2026 17:41
Last modified: 03 Feb 2026 02:54

Export record

Contributors

Author: Yue Zhang ORCID iD
Thesis advisor: Basel Halak ORCID iD
Thesis advisor: Leonardo Aniello ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×