학술논문

Importance of Logic Locking Attacks in Hardware Security
Document Type
Conference
Source
2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) Intelligent Data Communication Technologies and Internet of Things (IDCIoT), 2023 International Conference on. :156-160 Jan, 2023
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Threat modeling
Knowledge engineering
Integrated circuits
Rendering (computer graphics)
Foundries
Delays
Trojan horses
Logic Locking
SAT attack
Anti-SAT attack
Hardware Security
Language
Abstract
A rise in the number and devastating capability of hardware-based assaults has brought attention to the necessity of protecting the hardware root of trust alongside improvements in power, cost, performance, and reliability. The whole design of an integrated circuit can be concealed from a suspect foundry or end- user via a key-based circuit obfuscation or logic-locking approach. The method is based on introducing "key" input bits into the circuit to introduce ambiguity within the original circuit, rendering the circuit unreadable without the proper secret key. The present level of knowledge in this developing area is reviewed in this study, which also includes a threat model classification such as hardware Trojans, re verse engineering (RE) and side channel analysis. Moreover, the traditional and strong logic locking techniques and its efficiency in terms of area, power, delay is reviewed in hardware-based attacks.