Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4866
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMazumdar, Bodhisatwaen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:48Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:48Z-
dc.date.issued2020-
dc.identifier.citationSengupta, A., Mazumdar, B., Yasin, M., & Sinanoglu, O. (2020). Logic locking with provable security against power analysis attacks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(4), 766-778. doi:10.1109/TCAD.2019.2897699en_US
dc.identifier.issn0278-0070-
dc.identifier.otherEID(2-s2.0-85082401927)-
dc.identifier.urihttps://doi.org/10.1109/TCAD.2019.2897699-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4866-
dc.description.abstractOutsourcing of integrated circuit (IC) fabrication to external foundries has lead to many new security vulnerabilities, including IC piracy, overbuilding, and reverse engineering. In this regard, logic locking (LL) was introduced to protect intellectual property from such threats. In this paper, we evaluate the strength of various LL techniques, including earlier works, such as random LL (RLL) and fault analysis-based LL (FLL), against power-based side-channel attack. We have developed attacks where at least 60% of the key bits can be successfully recovered for 60% of the circuits for both RLL and FLL using a 32-bit key. However, the success rate reduces to 45% and 35% for RLL and FLL, respectively, when using a 64-bit key. We demonstrate the practicality of our proposed attack by mounting it against RLL and FLL implementations of ISCAS'85 and MCNC benchmark circuits on Spartan-6 FPGA platform. Further, we present differential power analysis (DPA) results on mutual information analysis on LL techniques that capture any dependence between the intermediate data and the captured power traces. We also formally establish that resilience to satisfiability-based (SAT) attack implies resilience to DPA attack as well for an LL technique. We validate this further via experiments on Spartan-6 FPGA on SAKURA-G development board for a recent LL technique that is known to thwart the SAT attack. © 1982-2012 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systemsen_US
dc.subjectComputer circuitsen_US
dc.subjectField programmable gate arrays (FPGA)en_US
dc.subjectFormal logicen_US
dc.subjectHardware securityen_US
dc.subjectIntegrated circuitsen_US
dc.subjectLocks (fasteners)en_US
dc.subjectBenchmark circuiten_US
dc.subjectBoolean satisfiabilityen_US
dc.subjectDifferential power Analysisen_US
dc.subjectDifferential power attacksen_US
dc.subjectIntegrated circuit fabricationen_US
dc.subjectlogic locking (LL)en_US
dc.subjectProvable securityen_US
dc.subjectSecurity vulnerabilitiesen_US
dc.subjectSide channel attacken_US
dc.titleLogic locking with provable security against power analysis attacksen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: