Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks

by   Dominik Sisejkovic, et al.

Logic locking has emerged as a prominent key-driven technique to protect the integrity of integrated circuits. However, novel machine-learning-based attacks have recently been introduced to challenge the security foundations of locking schemes. These attacks are able to recover a significant percentage of the key without having access to an activated circuit. This paper address this issue through two focal points. First, we present a theoretical model to test locking schemes for key-related structural leakage that can be exploited by machine learning. Second, based on the theoretical model, we introduce D-MUX: a deceptive multiplexer-based logic-locking scheme that is resilient against structure-exploiting machine learning attacks. Through the design of D-MUX, we uncover a major fallacy in existing multiplexer-based locking schemes in the form of a structural-analysis attack. Finally, an extensive cost evaluation of D-MUX is presented. To the best of our knowledge, D-MUX is the first machine-learning-resilient locking scheme capable of protecting against all known learning-based attacks. Hereby, the presented work offers a starting point for the design and evaluation of future-generation logic locking in the era of machine learning.


page 1

page 14


Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach

Logic locking is a prominent technique to protect the integrity of hardw...

Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities

In the past decade, a lot of progress has been made in the design and ev...

AutoLock: Automatic Design of Logic Locking with Evolutionary Computation

Logic locking protects the integrity of hardware designs throughout the ...

Automatic Hardware Trojan Insertion using Machine Learning

Due to the current horizontal business model that promotes increasing re...

Similarity-Based Logic Locking Against Machine Learning Attacks

Logic locking is a promising technique for protecting integrated circuit...

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

Obfuscation is a technique for protecting hardware intellectual property...

Functional Analysis Attacks on Logic Locking

This paper proposes Functional Analysis attacks on state of the art Logi...

Please sign up or login with your details

Forgot password? Click here to reset