Advancing logic locking: a new strategy combining dynamic and zero-knowledge techniques
Advancing logic locking: a new strategy combining dynamic and zero-knowledge techniques
The IC industry's growth has heightened attention to hardware security, particularly in the last decade. Major IC companies, aiming to cut costs, have begun outsourcing parts of their supply chain instead of managing it entirely in-house. This cost-saving strategy increases vulnerability to malicious attacks. To counter this, various defence mechanisms like logic locking have been proposed, offering protection against unauthorized IP access and supply chain threats with minimal design flow alterations.
Despite logic locking's many advantages in hardware defence, it confronts two major challenges. Firstly, significant efforts in the field have aimed at extracting secret keys from encrypted designs, particularly to clone IP. The SAT attack notably undermines the efficacy of logic locking. To mitigate this, various techniques like point function-based logic locking (PFB) have emerged, balancing SAT attack resilience with minimal product overhead. However, PFB's fixed mechanism inherently exposes specific properties, making it vulnerable to targeted attacks. Secondly, traditional logic locking presumes the design house's trustworthiness. However, internal malicious actors are a real threat in practice, against which current logic locking methods are ineffective.
This thesis introduces Dynamic Logic Locking (DLL), a new logic locking strategy to address the aforementioned security concerns. DLL's dynamic mechanism, unlike traditional methods, uses randomly generated locking blocks to counter SAT and other logic locking attacks. Its unique mechanism for each design eliminates structural vulnerabilities, unlike conventional fixed-mechanism blocks. Moreover, DLL's random block generation allows for zero-knowledge implementation by designers, who need not know the block's structure or secret key details. This makes DLL robust even against internal malicious attacks within the design house.
This thesis also introduces DLL-se, a sequential variant of DLL, expanding its application to sequential circuits for increased utility. Additionally, it presents a Python-based logic locking tool capable of integrating various logic locking types, including DLL, into Verilog netlists and simulating attacks on logic locking. With its clear GUI, the tool is accessible to designers and students and is suitable for hardware design and educational research.
University of Southampton
Zhang, Yue
51494047-017e-4f51-86b8-a2554ba28e77
2025
Zhang, Yue
51494047-017e-4f51-86b8-a2554ba28e77
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Aniello, Leonardo
9846e2e4-1303-4b8b-9092-5d8e9bb514c3
Zhang, Yue
(2025)
Advancing logic locking: a new strategy combining dynamic and zero-knowledge techniques.
University of Southampton, Doctoral Thesis, 168pp.
Record type:
Thesis
(Doctoral)
Abstract
The IC industry's growth has heightened attention to hardware security, particularly in the last decade. Major IC companies, aiming to cut costs, have begun outsourcing parts of their supply chain instead of managing it entirely in-house. This cost-saving strategy increases vulnerability to malicious attacks. To counter this, various defence mechanisms like logic locking have been proposed, offering protection against unauthorized IP access and supply chain threats with minimal design flow alterations.
Despite logic locking's many advantages in hardware defence, it confronts two major challenges. Firstly, significant efforts in the field have aimed at extracting secret keys from encrypted designs, particularly to clone IP. The SAT attack notably undermines the efficacy of logic locking. To mitigate this, various techniques like point function-based logic locking (PFB) have emerged, balancing SAT attack resilience with minimal product overhead. However, PFB's fixed mechanism inherently exposes specific properties, making it vulnerable to targeted attacks. Secondly, traditional logic locking presumes the design house's trustworthiness. However, internal malicious actors are a real threat in practice, against which current logic locking methods are ineffective.
This thesis introduces Dynamic Logic Locking (DLL), a new logic locking strategy to address the aforementioned security concerns. DLL's dynamic mechanism, unlike traditional methods, uses randomly generated locking blocks to counter SAT and other logic locking attacks. Its unique mechanism for each design eliminates structural vulnerabilities, unlike conventional fixed-mechanism blocks. Moreover, DLL's random block generation allows for zero-knowledge implementation by designers, who need not know the block's structure or secret key details. This makes DLL robust even against internal malicious attacks within the design house.
This thesis also introduces DLL-se, a sequential variant of DLL, expanding its application to sequential circuits for increased utility. Additionally, it presents a Python-based logic locking tool capable of integrating various logic locking types, including DLL, into Verilog netlists and simulating attacks on logic locking. With its clear GUI, the tool is accessible to designers and students and is suitable for hardware design and educational research.
Text
Final-thesis-submission-Examination-Mr-Yue-Zhang
Restricted to Repository staff only
More information
Published date: 2025
Identifiers
Local EPrints ID: 508724
URI: http://eprints.soton.ac.uk/id/eprint/508724
PURE UUID: f359948b-cdc4-44f2-91e2-3e30d710836b
Catalogue record
Date deposited: 02 Feb 2026 17:41
Last modified: 03 Feb 2026 02:54
Export record
Contributors
Author:
Yue Zhang
Thesis advisor:
Basel Halak
Thesis advisor:
Leonardo Aniello
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics