Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4866
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mazumdar, Bodhisatwa | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:35:48Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:35:48Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Sengupta, A., Mazumdar, B., Yasin, M., & Sinanoglu, O. (2020). Logic locking with provable security against power analysis attacks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(4), 766-778. doi:10.1109/TCAD.2019.2897699 | en_US |
dc.identifier.issn | 0278-0070 | - |
dc.identifier.other | EID(2-s2.0-85082401927) | - |
dc.identifier.uri | https://doi.org/10.1109/TCAD.2019.2897699 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4866 | - |
dc.description.abstract | Outsourcing of integrated circuit (IC) fabrication to external foundries has lead to many new security vulnerabilities, including IC piracy, overbuilding, and reverse engineering. In this regard, logic locking (LL) was introduced to protect intellectual property from such threats. In this paper, we evaluate the strength of various LL techniques, including earlier works, such as random LL (RLL) and fault analysis-based LL (FLL), against power-based side-channel attack. We have developed attacks where at least 60% of the key bits can be successfully recovered for 60% of the circuits for both RLL and FLL using a 32-bit key. However, the success rate reduces to 45% and 35% for RLL and FLL, respectively, when using a 64-bit key. We demonstrate the practicality of our proposed attack by mounting it against RLL and FLL implementations of ISCAS'85 and MCNC benchmark circuits on Spartan-6 FPGA platform. Further, we present differential power analysis (DPA) results on mutual information analysis on LL techniques that capture any dependence between the intermediate data and the captured power traces. We also formally establish that resilience to satisfiability-based (SAT) attack implies resilience to DPA attack as well for an LL technique. We validate this further via experiments on Spartan-6 FPGA on SAKURA-G development board for a recent LL technique that is known to thwart the SAT attack. © 1982-2012 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | en_US |
dc.subject | Computer circuits | en_US |
dc.subject | Field programmable gate arrays (FPGA) | en_US |
dc.subject | Formal logic | en_US |
dc.subject | Hardware security | en_US |
dc.subject | Integrated circuits | en_US |
dc.subject | Locks (fasteners) | en_US |
dc.subject | Benchmark circuit | en_US |
dc.subject | Boolean satisfiability | en_US |
dc.subject | Differential power Analysis | en_US |
dc.subject | Differential power attacks | en_US |
dc.subject | Integrated circuit fabrication | en_US |
dc.subject | logic locking (LL) | en_US |
dc.subject | Provable security | en_US |
dc.subject | Security vulnerabilities | en_US |
dc.subject | Side channel attack | en_US |
dc.title | Logic locking with provable security against power analysis attacks | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: