We use cookies to improve your experience with our site.

针对基于最小项保护伪装技术的攻击方法

An Efficient Technique to Reverse Engineer Minterm Protection Based Camouflaged Circuit

  • 摘要: 电路伪装技术的应用有效抵抗逆向工程(RE)的攻击,然而,它的有效性受到基于布尔可满足性(SAT)去伪装技术的威胁,此技术能在几分钟内高效破解伪装电路。为了抵御基于SAT的去伪装攻击,最近研究提出了一种全新的伪装策略(CamoPerturb),它通过替换一个逻辑门来干扰一项最小项,然后采用一个单独的伪装模块恢复被扰动的电路,此策略有力的抵抗基于SAT的攻击技术。本文通过采用测试向量自动生成(ATPG)技术中的通路敏化和逻辑蕴含研究逻辑门替换引起最小项扰动原理,分析CamoPerturb的安全缺陷,并提出了一种攻击方法来恢复替换门和电路功能。实验结果表明仅需极少的时间消耗即可高效恢复伪装电路。

     

    Abstract: Integrated circuit (IC) camouflaging technique has been applied as a countermeasure against reverse engineering (RE). However, its effectiveness is threatened by a boolean satisfiability (SAT) based de-camouflaging attack, which is able to restore the camouflaged circuit within only minutes. As a defense to the SAT-based de-camouflaging attack, a brand new camouflaging strategy (called CamoPerturb) has been proposed recently, which perturbs one minterm by changing one gate's functionality and then restores the perturbed circuit with a separated camouflaged block, achieving good resistance against the SAT-based attack. In this paper, we analyze the security vulnerabilities of CamoPerturb by illustrating the mechanism of minterm perturbation induced by gate replacement, then propose an attack to restore the changed gate's functionality, and recover the camouflaged circuit. The attack algorithm is facilitated by sensitization and implication principles in automatic test pattern generation (ATPG) techniques. Experimental results demonstrate that our method is able to restore the camouflaged circuits with very little time consumption.

     

/

返回文章
返回