Skip to main content

Security Evaluation of a Locked IP: A Step-by-Step Guide

  • Chapter
  • First Online:
Understanding Logic Locking

Abstract

The evaluation of logic locking security is a multifaceted undertaking that necessitates the application of experimental methods by researchers. These methods involve employing specific inputs tailored to different attack scenarios and assessing the security of the encryption logic by analyzing the level of difficulty encountered by the attacks. In this chapter, we will delve into an elaborate exploration of the distinct methodologies employed for evaluating logic locking security. The chapter will provide a top-view introduction to these specific evaluation methods, shedding light on their strengths, limitations, and real-world applicability. By delving into the experimental techniques, researchers gain insights into the vulnerabilities, strengths, and potential weaknesses of logic locking schemes. This knowledge enables the identification and analysis of attack vectors, thereby facilitating the development of robust countermeasures and enhanced security mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    It is worth noting that the theory behind the availability of netlist and oracle have been previously discussed in Chap. 5. Here, we assume that the locked netlist is available through physical reverse engineering and the oracle is purchased from the open market.

References

  1. Subramanyan, P., Ray, S., & Malik, S. (2015). Evaluating the security of logic encryption algorithms. In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (pp. 137–143). IEEE.

    Google Scholar 

  2. Shamsi, K. (2021). Netlist Encryption and Obfuscation Suite. https://bitbucket.org/kavehshm/neos/src/master/.

    Google Scholar 

  3. Guo, R., Rahman, M. S., Kamali, H. M., Rahman, F., Farahmandi, F., & Tehranipoor, M. (2023). EvoLUTe: evaluation of look-up-table-based fine-grained IP redaction. In Design, Automation and Test in Europe (DATE) (pp. 1–6).

    Google Scholar 

  4. Kamali, H. M., Azar, K. Z., Farahmandi, F., & Tehranipoor, M. (2022). Advances in logic locking: Past, present, and prospects. In Cryptology. ePrint Archive.

    Google Scholar 

  5. Brayton, R., & Mishchenko, A. (2010). ABC: An academic industrial-strength verification tool. In Computer Aided Verification: 22nd International Conference, CAV 2010, Edinburgh, UK, July 15–19, 2010. Proceedings 22 (pp. 24–40). Springer.

    Google Scholar 

  6. Roshanisefat, S., Kamali, H. M., Homayoun, H., & Sasan, A. (2021). RANE: An open-source formal de-obfuscation attack for reverse engineering of logic encrypted circuits. In Proceedings of the 2021 on Great Lakes Symposium on VLSI (pp. 221–228).

    Google Scholar 

  7. Azar, K. Z., Kamali, H. M., Homayoun, H., & Sasan, A. (2019). SMT attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems, 97–122.

    Google Scholar 

  8. Takamaeda-Yamazaki, S. (2015). Pyverilog: A python-based hardware design processing toolkit for verilog hdl. In Applied Reconfigurable Computing: 11th International Symposium, ARC 2015, Bochum, Germany, April 13–17, 2015, Proceedings 11 (pp. 451–460). Springer.

    Google Scholar 

  9. Amir, S., Shakya, B., Xu, X., Jin, Y., Bhunia, S., Tehranipoor, M., & Forte, D. (2018). Development and evaluation of hardware obfuscation benchmarks. Journal of Hardware and Systems Security, 2, 142–161.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zamiri Azar, K., Mardani Kamali, H., Farahmandi, F., Tehranipoor, M. (2024). Security Evaluation of a Locked IP: A Step-by-Step Guide. In: Understanding Logic Locking. Springer, Cham. https://doi.org/10.1007/978-3-031-37989-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-37989-5_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-37988-8

  • Online ISBN: 978-3-031-37989-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics